Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe
-
Size
119KB
-
MD5
e330753fdac8ee50bf767126cb7bef6c
-
SHA1
bc306f0e87671ae6e8f4fa57d41209ad7d5a4519
-
SHA256
d587a8e333eb35cd2f6525b80417aa411209b58a0b7dbba581c0e30802440f2f
-
SHA512
2a2f095ce877f3d0cc4733248d65d66e772f761a4f7fcdc2e6a3433696ad5955d3719222ca0f7ede5edb777114bb7db56fe29bf5121ddce14334db3c67bc242b
-
SSDEEP
1536:VZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApEcvu3poO2iMf:vnxwgxgfR/DVG7wBpEcvlO5Mf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2864 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2864-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2864-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2412-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2864-76-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2864-597-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mraut.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\pdmproxy100.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClientsideProviders.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_es_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\w2k_lsa_auth.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\instrument.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClient.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libgestures_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\liboldmovie_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html svchost.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMCCore.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libfile_keystore_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadco.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\msdbg2.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_srt_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libudp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\liboldrc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\libtaglib_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\flyout.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACERECR.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javafx-iio.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libpva_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\sqlite.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\EEINTL.DLL svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACERCLR.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcs.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ONBttnIE.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpostproc_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACEWSTR.DLL svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2iexp.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Web.Entity.Resources.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssv.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationClientsideProviders.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\JNWDRV.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSO.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwgst.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\GrooveIntlResource.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-multibyte-l1-1-0.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\MSOINTL.DLL svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msader15.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace2.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Entity.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnoseek_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRdIF.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2864 WaterMark.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2864 WaterMark.exe Token: SeDebugPrivilege 2100 svchost.exe Token: SeDebugPrivilege 2864 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 2864 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2864 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2864 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2864 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2864 2412 e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2740 2864 WaterMark.exe 31 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2864 wrote to memory of 2100 2864 WaterMark.exe 32 PID 2100 wrote to memory of 256 2100 svchost.exe 1 PID 2100 wrote to memory of 256 2100 svchost.exe 1 PID 2100 wrote to memory of 256 2100 svchost.exe 1 PID 2100 wrote to memory of 256 2100 svchost.exe 1 PID 2100 wrote to memory of 256 2100 svchost.exe 1 PID 2100 wrote to memory of 332 2100 svchost.exe 2 PID 2100 wrote to memory of 332 2100 svchost.exe 2 PID 2100 wrote to memory of 332 2100 svchost.exe 2 PID 2100 wrote to memory of 332 2100 svchost.exe 2 PID 2100 wrote to memory of 332 2100 svchost.exe 2 PID 2100 wrote to memory of 384 2100 svchost.exe 3 PID 2100 wrote to memory of 384 2100 svchost.exe 3 PID 2100 wrote to memory of 384 2100 svchost.exe 3 PID 2100 wrote to memory of 384 2100 svchost.exe 3 PID 2100 wrote to memory of 384 2100 svchost.exe 3 PID 2100 wrote to memory of 392 2100 svchost.exe 4 PID 2100 wrote to memory of 392 2100 svchost.exe 4 PID 2100 wrote to memory of 392 2100 svchost.exe 4 PID 2100 wrote to memory of 392 2100 svchost.exe 4 PID 2100 wrote to memory of 392 2100 svchost.exe 4 PID 2100 wrote to memory of 432 2100 svchost.exe 5 PID 2100 wrote to memory of 432 2100 svchost.exe 5 PID 2100 wrote to memory of 432 2100 svchost.exe 5 PID 2100 wrote to memory of 432 2100 svchost.exe 5 PID 2100 wrote to memory of 432 2100 svchost.exe 5 PID 2100 wrote to memory of 476 2100 svchost.exe 6 PID 2100 wrote to memory of 476 2100 svchost.exe 6 PID 2100 wrote to memory of 476 2100 svchost.exe 6 PID 2100 wrote to memory of 476 2100 svchost.exe 6 PID 2100 wrote to memory of 476 2100 svchost.exe 6 PID 2100 wrote to memory of 492 2100 svchost.exe 7 PID 2100 wrote to memory of 492 2100 svchost.exe 7 PID 2100 wrote to memory of 492 2100 svchost.exe 7 PID 2100 wrote to memory of 492 2100 svchost.exe 7 PID 2100 wrote to memory of 492 2100 svchost.exe 7 PID 2100 wrote to memory of 500 2100 svchost.exe 8 PID 2100 wrote to memory of 500 2100 svchost.exe 8 PID 2100 wrote to memory of 500 2100 svchost.exe 8 PID 2100 wrote to memory of 500 2100 svchost.exe 8 PID 2100 wrote to memory of 500 2100 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1468
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:352
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:1120
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:236
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1032
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2944
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2972
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e330753fdac8ee50bf767126cb7bef6c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5e330753fdac8ee50bf767126cb7bef6c
SHA1bc306f0e87671ae6e8f4fa57d41209ad7d5a4519
SHA256d587a8e333eb35cd2f6525b80417aa411209b58a0b7dbba581c0e30802440f2f
SHA5122a2f095ce877f3d0cc4733248d65d66e772f761a4f7fcdc2e6a3433696ad5955d3719222ca0f7ede5edb777114bb7db56fe29bf5121ddce14334db3c67bc242b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize251KB
MD5ef9fbccccfbf2334d54d3e5e15d74dc9
SHA1d50e37d9e1239761472939a4073cd6cac3ac63a8
SHA25644c7324d9a9f34a3eb1d26d4d378bdd276574fc0a8781ffdef78d3fbf136a851
SHA51263ea98f051b0152635c684096a3c4a779eaccbafebf53311e5e9d75bdf826e7b1af2c8e8d40ffc04711534e60810ce685a84e8df76b01d451bdf89ee4602c105
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize247KB
MD50d8ebcc3c3c0c0d93c31d5c650e61645
SHA1e26f91ff4116f5d01f97acbf86d8f0e107271c76
SHA25660cc15b45c14bd5783dfd00caae2ebed0ca11856b4ce91eea8a2e0511d7fc72b
SHA512609b1ae40e32400db5b17bfb1475b7b56976f49ec32f809c24a4721e20971a36e7e69a6ab7ceaf9528d311141a2063a3a94874d01cbcd2d7bc4182a3eec1bd4a