Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe
-
Size
121KB
-
MD5
40cbdbfc0a84ae4d01c65dbb3c0cb540
-
SHA1
3f956277169858741c8404e56fdbaa6e721887de
-
SHA256
41d31d40c2d0fe5a7e00460144cf7b3457b870c60a485dade9057d99211824d3
-
SHA512
b4fbf352347002be2efdf5e8b04146c1490e09eb7af21cc5bafd23e46a60f0c4d700b6ab5cfc237b8b74fd40d2f9d121695e30325f261c4573bc5bfdc47724bd
-
SSDEEP
3072:rR2xn3k0CdM1vabyzJYWql6xfa+atPmJuUH:rR2J0LS6Vl649IH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 1940 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/1576-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1940-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1576-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1940-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1940-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1940-594-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Xml.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libfile_keystore_plugin.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\F12Tools.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\jsdebuggeride.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\liberase_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\micaut.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\OARPMANR.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Services.Client.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libmono_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libplaylist_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\cpu.html svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXSLE.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\atl.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dt_shmem.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\deployJava1.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libavi_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libmpg123_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_hevc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\librss_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libadjust_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\eclipse_1665.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jfxwebkit.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\installer.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationCore.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcrystalhd_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libsubsusf_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawvid_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\wabfind.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dcpr.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\More Games\MoreGames.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.IO.Log.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Conversion.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_flac_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libvhs_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\sunec.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_rgb_mmx_plugin.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 1940 WaterMark.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1940 WaterMark.exe Token: SeDebugPrivilege 2768 svchost.exe Token: SeDebugPrivilege 1940 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 1940 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1940 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 30 PID 1576 wrote to memory of 1940 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 30 PID 1576 wrote to memory of 1940 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 30 PID 1576 wrote to memory of 1940 1576 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 30 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2776 1940 WaterMark.exe 31 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 1940 wrote to memory of 2768 1940 WaterMark.exe 32 PID 2768 wrote to memory of 256 2768 svchost.exe 1 PID 2768 wrote to memory of 256 2768 svchost.exe 1 PID 2768 wrote to memory of 256 2768 svchost.exe 1 PID 2768 wrote to memory of 256 2768 svchost.exe 1 PID 2768 wrote to memory of 256 2768 svchost.exe 1 PID 2768 wrote to memory of 336 2768 svchost.exe 2 PID 2768 wrote to memory of 336 2768 svchost.exe 2 PID 2768 wrote to memory of 336 2768 svchost.exe 2 PID 2768 wrote to memory of 336 2768 svchost.exe 2 PID 2768 wrote to memory of 336 2768 svchost.exe 2 PID 2768 wrote to memory of 384 2768 svchost.exe 3 PID 2768 wrote to memory of 384 2768 svchost.exe 3 PID 2768 wrote to memory of 384 2768 svchost.exe 3 PID 2768 wrote to memory of 384 2768 svchost.exe 3 PID 2768 wrote to memory of 384 2768 svchost.exe 3 PID 2768 wrote to memory of 396 2768 svchost.exe 4 PID 2768 wrote to memory of 396 2768 svchost.exe 4 PID 2768 wrote to memory of 396 2768 svchost.exe 4 PID 2768 wrote to memory of 396 2768 svchost.exe 4 PID 2768 wrote to memory of 396 2768 svchost.exe 4 PID 2768 wrote to memory of 432 2768 svchost.exe 5 PID 2768 wrote to memory of 432 2768 svchost.exe 5 PID 2768 wrote to memory of 432 2768 svchost.exe 5 PID 2768 wrote to memory of 432 2768 svchost.exe 5 PID 2768 wrote to memory of 432 2768 svchost.exe 5 PID 2768 wrote to memory of 480 2768 svchost.exe 6 PID 2768 wrote to memory of 480 2768 svchost.exe 6 PID 2768 wrote to memory of 480 2768 svchost.exe 6 PID 2768 wrote to memory of 480 2768 svchost.exe 6 PID 2768 wrote to memory of 480 2768 svchost.exe 6 PID 2768 wrote to memory of 488 2768 svchost.exe 7 PID 2768 wrote to memory of 488 2768 svchost.exe 7 PID 2768 wrote to memory of 488 2768 svchost.exe 7 PID 2768 wrote to memory of 488 2768 svchost.exe 7 PID 2768 wrote to memory of 488 2768 svchost.exe 7 PID 2768 wrote to memory of 496 2768 svchost.exe 8 PID 2768 wrote to memory of 496 2768 svchost.exe 8 PID 2768 wrote to memory of 496 2768 svchost.exe 8 PID 2768 wrote to memory of 496 2768 svchost.exe 8 PID 2768 wrote to memory of 496 2768 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:612
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1260
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1268
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:824
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1192
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:868
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:1208
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:292
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:920
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1080
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:2044
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2232
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2284
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD540cbdbfc0a84ae4d01c65dbb3c0cb540
SHA13f956277169858741c8404e56fdbaa6e721887de
SHA25641d31d40c2d0fe5a7e00460144cf7b3457b870c60a485dade9057d99211824d3
SHA512b4fbf352347002be2efdf5e8b04146c1490e09eb7af21cc5bafd23e46a60f0c4d700b6ab5cfc237b8b74fd40d2f9d121695e30325f261c4573bc5bfdc47724bd
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize255KB
MD55d74738714528e0036e32f16344be062
SHA1ebbbaafcc7219097ec3f889e6f4c47e1b514691d
SHA256b7c7753550eec92f586464eb172bc42f0d071b171b53675cfaf8f5b4046bf4bb
SHA5129829cfbf2dcb7171e290b6d620eddb5ad3b211ff1c536a9e00a9b9bcbb06da842721885a1215db3b6f234fd1059fab822b7a93881ec1251f1be89e5843cf84d4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize252KB
MD5a087a5cde20a51318cb9935725bda302
SHA1b05a9205b27cf1e94e3a32a74e58ceb708e8d7f3
SHA2563ca558cfbdce95d0db6603f5c2ca488e179c8009b41e93e1ca2d34d268d75b81
SHA512f77e3f66655779e8c3b2d08ee8d2394191b39ed5deacddec9b9e51cb8c9f867f7881f98b3983d346522ce47a0087198b6877945cbf8dd6c2d9aa5b916afa49fe