Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe
-
Size
123KB
-
MD5
884eb82eda7b82bc74baeabd392ba7bb
-
SHA1
b8eebe594495a27857b1ac955e7a96eed5faadbb
-
SHA256
3e2f610e362c303ebac67059af06ffe2bc103960fb1afbf975d4fdd3f5d8bcb0
-
SHA512
313fd01fb746826bdb1339b364ed98684a3278d4ce45089093787836f6cdc67fd66eb9561f71640a5663e70df34f6cdc9529daa22ca586acd6cd521b5a88e724
-
SSDEEP
1536:1R0vxn3Pc0LCH9MtbvabUDzJYWu3BmiIuw22Jn1fbO4V:1R2xn3k0CdM1vabyzJYWqQa2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2980-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2980-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2320-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2320-593-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Portable Devices\sqmapi.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libttml_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libfingerprinter_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_bridge_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libswscale_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\hprof.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_chromecast_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\liblogo_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_mlp_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Management.Instrumentation.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libnormvol_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\README.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\eula.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\w2k_lsa_auth.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\UIAutomationClientsideProviders.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libedgedetection_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\mpvis.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tpcps.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\JavaAccessBridge-64.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\t2k.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\msitss55.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACETXT.DLL svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleHandler.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Utilities.v3.5.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEERR.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadce.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaom_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libsubstx3g_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_transcode_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\libvlc.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libflacsys_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\currency.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\liboldmovie_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_sse2_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_i420_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\NPSWF32.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jli.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libvcd_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libstl_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libfreetype_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\librv32_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2320 WaterMark.exe Token: SeDebugPrivilege 2688 svchost.exe Token: SeDebugPrivilege 2320 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 2320 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2320 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2320 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2320 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2320 2980 884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2280 2320 WaterMark.exe 31 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2320 wrote to memory of 2688 2320 WaterMark.exe 32 PID 2688 wrote to memory of 256 2688 svchost.exe 1 PID 2688 wrote to memory of 256 2688 svchost.exe 1 PID 2688 wrote to memory of 256 2688 svchost.exe 1 PID 2688 wrote to memory of 256 2688 svchost.exe 1 PID 2688 wrote to memory of 256 2688 svchost.exe 1 PID 2688 wrote to memory of 336 2688 svchost.exe 2 PID 2688 wrote to memory of 336 2688 svchost.exe 2 PID 2688 wrote to memory of 336 2688 svchost.exe 2 PID 2688 wrote to memory of 336 2688 svchost.exe 2 PID 2688 wrote to memory of 336 2688 svchost.exe 2 PID 2688 wrote to memory of 384 2688 svchost.exe 3 PID 2688 wrote to memory of 384 2688 svchost.exe 3 PID 2688 wrote to memory of 384 2688 svchost.exe 3 PID 2688 wrote to memory of 384 2688 svchost.exe 3 PID 2688 wrote to memory of 384 2688 svchost.exe 3 PID 2688 wrote to memory of 396 2688 svchost.exe 4 PID 2688 wrote to memory of 396 2688 svchost.exe 4 PID 2688 wrote to memory of 396 2688 svchost.exe 4 PID 2688 wrote to memory of 396 2688 svchost.exe 4 PID 2688 wrote to memory of 396 2688 svchost.exe 4 PID 2688 wrote to memory of 432 2688 svchost.exe 5 PID 2688 wrote to memory of 432 2688 svchost.exe 5 PID 2688 wrote to memory of 432 2688 svchost.exe 5 PID 2688 wrote to memory of 432 2688 svchost.exe 5 PID 2688 wrote to memory of 432 2688 svchost.exe 5 PID 2688 wrote to memory of 476 2688 svchost.exe 6 PID 2688 wrote to memory of 476 2688 svchost.exe 6 PID 2688 wrote to memory of 476 2688 svchost.exe 6 PID 2688 wrote to memory of 476 2688 svchost.exe 6 PID 2688 wrote to memory of 476 2688 svchost.exe 6 PID 2688 wrote to memory of 492 2688 svchost.exe 7 PID 2688 wrote to memory of 492 2688 svchost.exe 7 PID 2688 wrote to memory of 492 2688 svchost.exe 7 PID 2688 wrote to memory of 492 2688 svchost.exe 7 PID 2688 wrote to memory of 492 2688 svchost.exe 7 PID 2688 wrote to memory of 500 2688 svchost.exe 8 PID 2688 wrote to memory of 500 2688 svchost.exe 8 PID 2688 wrote to memory of 500 2688 svchost.exe 8 PID 2688 wrote to memory of 500 2688 svchost.exe 8 PID 2688 wrote to memory of 500 2688 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1556
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1576
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:760
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:824
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1156
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:860
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:308
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:276
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1080
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2196
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2152
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\884eb82eda7b82bc74baeabd392ba7bb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5884eb82eda7b82bc74baeabd392ba7bb
SHA1b8eebe594495a27857b1ac955e7a96eed5faadbb
SHA2563e2f610e362c303ebac67059af06ffe2bc103960fb1afbf975d4fdd3f5d8bcb0
SHA512313fd01fb746826bdb1339b364ed98684a3278d4ce45089093787836f6cdc67fd66eb9561f71640a5663e70df34f6cdc9529daa22ca586acd6cd521b5a88e724
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize260KB
MD539b2bd3cb2c3fc122a3d5fd55c3a4298
SHA1059314d72a2135fa9178355d65c58514082ba9d1
SHA256af3ace753cbd8da99e06fe8cba66ee797503de2abf8a353c77ba3b7fc7aae9b3
SHA512b975701ce7dcf87f5fb3aade2ff41fcec67003becb4b6f01d2dfb8670c333b5bb8624fb0898dd7cf6d43795013503fce72b58dac9d7804299d359688c1aa5985
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize256KB
MD58979453de1b08a0ebdc52dae630fa241
SHA1be850820b03398a1e42480eaca88a636f190dd62
SHA25636422d3dc5b524f747999751e80ef8cc5106dee1b7c45b737e5049f9b62192c6
SHA512b4def86327032d05ff9b3839a84b992cf1cd30f02458de5f21be45e60c527c497d3affe4a0a38bcb46bf3d8b762f6a65ba0d0e0c184bc3c02d45bb93758ace22