Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe
-
Size
95KB
-
MD5
cc86e454b4319959b61b285c3e768e7b
-
SHA1
17c211d07053291cc9eee674c2969df070f0ef04
-
SHA256
20d299864355d5959d656bd412ec8c3032aa7fc66858505629a0fb1a8c61b4a8
-
SHA512
4c0fcb6261f9b99545a4c952ea936c68fc084b8b871bd6c3e3654cdc1d9b2f7377b3cc572004d3ec522629dba47511fba1b9a716273ce0a9c88779cc337a4e20
-
SSDEEP
768:B06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:nR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2356 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/1972-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1972-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2356-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2356-27-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2356-77-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2356-589-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdvdnav_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemuxdump_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\slideShow.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\pdmproxy100.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\msitss55.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_setid_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Framework.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libdolby_surround_decoder_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\vk_swiftshader.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2native.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClientsideProviders.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\clock.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIBUtils.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dt_socket.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.ComponentModel.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.Design.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libmono_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\OSETUPUI.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaom_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libimage_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libflaschen_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\settings.html svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\UIAutomationTypes.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libflacsys_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\libtaglib_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libgme_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado15.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcor.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\prism-d3d.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.IdentityModel.Selectors.Resources.dll svchost.exe File opened for modification C:\Program Files\UseCheckpoint.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.DynamicData.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libhttps_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\odffilt.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavcodec.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.Speech.resources.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2356 WaterMark.exe Token: SeDebugPrivilege 2772 svchost.exe Token: SeDebugPrivilege 2356 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 2356 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2356 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 30 PID 1972 wrote to memory of 2356 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 30 PID 1972 wrote to memory of 2356 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 30 PID 1972 wrote to memory of 2356 1972 JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe 30 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2752 2356 WaterMark.exe 31 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2772 2356 WaterMark.exe 32 PID 2772 wrote to memory of 256 2772 svchost.exe 1 PID 2772 wrote to memory of 256 2772 svchost.exe 1 PID 2772 wrote to memory of 256 2772 svchost.exe 1 PID 2772 wrote to memory of 256 2772 svchost.exe 1 PID 2772 wrote to memory of 256 2772 svchost.exe 1 PID 2772 wrote to memory of 336 2772 svchost.exe 2 PID 2772 wrote to memory of 336 2772 svchost.exe 2 PID 2772 wrote to memory of 336 2772 svchost.exe 2 PID 2772 wrote to memory of 336 2772 svchost.exe 2 PID 2772 wrote to memory of 336 2772 svchost.exe 2 PID 2772 wrote to memory of 384 2772 svchost.exe 3 PID 2772 wrote to memory of 384 2772 svchost.exe 3 PID 2772 wrote to memory of 384 2772 svchost.exe 3 PID 2772 wrote to memory of 384 2772 svchost.exe 3 PID 2772 wrote to memory of 384 2772 svchost.exe 3 PID 2772 wrote to memory of 396 2772 svchost.exe 4 PID 2772 wrote to memory of 396 2772 svchost.exe 4 PID 2772 wrote to memory of 396 2772 svchost.exe 4 PID 2772 wrote to memory of 396 2772 svchost.exe 4 PID 2772 wrote to memory of 396 2772 svchost.exe 4 PID 2772 wrote to memory of 432 2772 svchost.exe 5 PID 2772 wrote to memory of 432 2772 svchost.exe 5 PID 2772 wrote to memory of 432 2772 svchost.exe 5 PID 2772 wrote to memory of 432 2772 svchost.exe 5 PID 2772 wrote to memory of 432 2772 svchost.exe 5 PID 2772 wrote to memory of 476 2772 svchost.exe 6 PID 2772 wrote to memory of 476 2772 svchost.exe 6 PID 2772 wrote to memory of 476 2772 svchost.exe 6 PID 2772 wrote to memory of 476 2772 svchost.exe 6 PID 2772 wrote to memory of 476 2772 svchost.exe 6 PID 2772 wrote to memory of 492 2772 svchost.exe 7 PID 2772 wrote to memory of 492 2772 svchost.exe 7 PID 2772 wrote to memory of 492 2772 svchost.exe 7 PID 2772 wrote to memory of 492 2772 svchost.exe 7 PID 2772 wrote to memory of 492 2772 svchost.exe 7 PID 2772 wrote to memory of 500 2772 svchost.exe 8 PID 2772 wrote to memory of 500 2772 svchost.exe 8 PID 2772 wrote to memory of 500 2772 svchost.exe 8 PID 2772 wrote to memory of 500 2772 svchost.exe 8 PID 2772 wrote to memory of 500 2772 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1272
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:340
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:748
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:824
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1080
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:852
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2272
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:108
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1056
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1072
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1136
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1564
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2304
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2220
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc86e454b4319959b61b285c3e768e7b.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize204KB
MD530f7376770e5c6f1a187b452556ed2ba
SHA17b679241d1a61af12e6d8066b0303487ec884370
SHA256038a14fa34837bf1440ef04fd4c18ff57f7db380f83f9ec32767fde2a0f3b5c2
SHA512a9017504dc0fe7d55ea92addd887a48106d133a12d4dc4afee482b6942bf292fed8042a1f3fb97d1a535693397bf24ba9ce856895a7d619126513b5b59305e1b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize200KB
MD5fb11ea641e50156d0c087e53814b35a7
SHA19c8d41aeb5edd402f461f4a19766a4ed1fd8481a
SHA2560441d7dcdf9b04d3c4e5812c434493c2e8becf184b4482ac7889572e53a16601
SHA5123b2528a870440bf4fd49cc4897aa529d240a89967854287c6d2d9df166e51056e3f13873e14965e045beba937d12c7ebe4d944dc2eb69fc0c08e8182030c1cae
-
Filesize
95KB
MD5cc86e454b4319959b61b285c3e768e7b
SHA117c211d07053291cc9eee674c2969df070f0ef04
SHA25620d299864355d5959d656bd412ec8c3032aa7fc66858505629a0fb1a8c61b4a8
SHA5124c0fcb6261f9b99545a4c952ea936c68fc084b8b871bd6c3e3654cdc1d9b2f7377b3cc572004d3ec522629dba47511fba1b9a716273ce0a9c88779cc337a4e20