Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
07d989b44d1783a67e3ee115d50fbbec_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
07d989b44d1783a67e3ee115d50fbbec_JaffaCakes118.dll
-
Size
677KB
-
MD5
07d989b44d1783a67e3ee115d50fbbec
-
SHA1
2f5798e6012684229729760e02cf5582f90d49ac
-
SHA256
73a183e78a4e83c9bdb1e829bcc81b0bf20c61e7ccaddecabe9e266fc9257fad
-
SHA512
16b6f5a7d935465a2f7d4e5a21b856f11f79924d207e32c8650f9576298ae5cbce6ee8103744fa42957736e81a94f538d4e0ac5863843892f0e3f5155dfd8249
-
SSDEEP
12288:4NIyZN4+Wv4PLq6Okrh9ZN/hs9DsdvEjbHR0:49TPmirh9Zdh6v/x0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2988 rundll32mgr.exe 2592 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe 2988 rundll32mgr.exe 2988 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2988-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2988-13-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2988-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2592-39-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2592-42-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2592-83-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2592-621-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IPSEventLogMsg.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\msvcr100.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcdg_plugin.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Management.Instrumentation.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libprefetch_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libgrey_yuv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libball_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libvhs_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libvorbis_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\liblibbluray_plugin.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\D3DCompiler_47.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\libconsole_logger_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwjpn.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libgl_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libclone_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.DataSetExtensions.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Extensions.Design.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\librtp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtwolame_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_delay_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcanvas_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.Speech.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Core.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libaddonsfsstorage_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODDBS.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libntservice_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_hevc_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\libvisual_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSSOAP30.DLL svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_srt_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\JdbcOdbc.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jfxmedia.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscale_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2848 2552 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 2592 WaterMark.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2592 WaterMark.exe Token: SeDebugPrivilege 580 svchost.exe Token: SeDebugPrivilege 2552 rundll32.exe Token: SeDebugPrivilege 2848 WerFault.exe Token: SeDebugPrivilege 2592 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 rundll32mgr.exe 2592 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2552 wrote to memory of 2988 2552 rundll32.exe 29 PID 2552 wrote to memory of 2988 2552 rundll32.exe 29 PID 2552 wrote to memory of 2988 2552 rundll32.exe 29 PID 2552 wrote to memory of 2988 2552 rundll32.exe 29 PID 2552 wrote to memory of 2848 2552 rundll32.exe 30 PID 2552 wrote to memory of 2848 2552 rundll32.exe 30 PID 2552 wrote to memory of 2848 2552 rundll32.exe 30 PID 2552 wrote to memory of 2848 2552 rundll32.exe 30 PID 2988 wrote to memory of 2592 2988 rundll32mgr.exe 31 PID 2988 wrote to memory of 2592 2988 rundll32mgr.exe 31 PID 2988 wrote to memory of 2592 2988 rundll32mgr.exe 31 PID 2988 wrote to memory of 2592 2988 rundll32mgr.exe 31 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 2516 2592 WaterMark.exe 32 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 2592 wrote to memory of 580 2592 WaterMark.exe 33 PID 580 wrote to memory of 256 580 svchost.exe 1 PID 580 wrote to memory of 256 580 svchost.exe 1 PID 580 wrote to memory of 256 580 svchost.exe 1 PID 580 wrote to memory of 256 580 svchost.exe 1 PID 580 wrote to memory of 256 580 svchost.exe 1 PID 580 wrote to memory of 336 580 svchost.exe 2 PID 580 wrote to memory of 336 580 svchost.exe 2 PID 580 wrote to memory of 336 580 svchost.exe 2 PID 580 wrote to memory of 336 580 svchost.exe 2 PID 580 wrote to memory of 336 580 svchost.exe 2 PID 580 wrote to memory of 384 580 svchost.exe 3 PID 580 wrote to memory of 384 580 svchost.exe 3 PID 580 wrote to memory of 384 580 svchost.exe 3 PID 580 wrote to memory of 384 580 svchost.exe 3 PID 580 wrote to memory of 384 580 svchost.exe 3 PID 580 wrote to memory of 396 580 svchost.exe 4 PID 580 wrote to memory of 396 580 svchost.exe 4 PID 580 wrote to memory of 396 580 svchost.exe 4 PID 580 wrote to memory of 396 580 svchost.exe 4 PID 580 wrote to memory of 396 580 svchost.exe 4 PID 580 wrote to memory of 432 580 svchost.exe 5 PID 580 wrote to memory of 432 580 svchost.exe 5 PID 580 wrote to memory of 432 580 svchost.exe 5 PID 580 wrote to memory of 432 580 svchost.exe 5 PID 580 wrote to memory of 432 580 svchost.exe 5
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1476
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:344
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:656
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:732
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1096
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2536
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:276
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1088
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1152
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1980
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:304
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07d989b44d1783a67e3ee115d50fbbec_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07d989b44d1783a67e3ee115d50fbbec_JaffaCakes118.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2244⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize197KB
MD558b849ef8b9f7be4dd39e96d6e48cc71
SHA1569f7d75b653cb0f8f958c9c111094f04391be9a
SHA256c7216174b76c4f27236cc2be07cd3479e29c28dd503834ca4d229b5ee974e3ea
SHA512790e702e4ab729cabe3f3603ee5713e4cb9088f50937bb6eae328b77cf954d03f5979675ff07c13fe2c038a556e52b82fea2b116581ffdf1e229ca0f9f2ce09d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize193KB
MD559e867fbb9f2b31e9e77ce360f6a61dc
SHA10c37cd23c122f8df31627439d88cfe8a5f685c60
SHA256fa34928bb4ee8851dea35d7fa2d6751bf9f6aa498af20a10f7b00017035110eb
SHA5124845fc6ade558917926e4c81d3ba179fab3a0f2c32631ed6edb2473895ce5c3950903895e88b3233aab9c1026d4ffb42a9e53704352396b4cb443488bff50388
-
Filesize
92KB
MD54ff6af3c7917333f6962d041c1c138b0
SHA13da870a75d92c62b798b0b2c82a8828e0fd1a6e6
SHA25623b1beaef490a528030292949c5aaed7c7e7817be137483bb9c0444d0f9e9204
SHA51239531a5ed1d391e9f860700c9c054bcc5a9a0eb002dc47aae2c3a0dbdedcb0ac02eb9d3a2bd1d678670610ba689aadb6e9d7ca7e538534e985b5365dd4f2c3d5