Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_633e02336a45e4fd40d46cfa554f999d.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_633e02336a45e4fd40d46cfa554f999d.dll
-
Size
751KB
-
MD5
633e02336a45e4fd40d46cfa554f999d
-
SHA1
46ae375ded8b3591e4739ffc75b564227045a283
-
SHA256
8dea99d9d23e98f8b67c6bcafb6d1f59a16406d229056567b3ee6bd090d3eaac
-
SHA512
4c58fb9db9ea00b36ded52e7ad924912c1eefd5ebd65612b9b3030654a34c6eda023ed057c39f695b38fb6d6dc9288f3d884cfa8c79dafa56ee41e5f3fd6f747
-
SSDEEP
12288:6zb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwP+ACQL:6zb1MlCKUQyUmjtczu6Prs9pgWoopooG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2092 rundll32mgr.exe 1464 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 2160 rundll32.exe 2160 rundll32.exe 2092 rundll32mgr.exe 2092 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/memory/1464-41-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1464-36-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/2092-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-14-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2092-13-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1464-89-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1464-668-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe svchost.exe File opened for modification C:\Program Files\Internet Explorer\F12.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\eula.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\settings.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledb32r.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libhds_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libfps_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqloledb.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\nio.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationClientsideProviders.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Linq.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libimage_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\currency.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxCCD1.tmp rundll32mgr.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationClient.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libnfs_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsatip_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgradfun_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpuzzle_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\WindowsAccessBridge-64.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\sunmscapi.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Runtime.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Xml.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsdp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgrain_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libclone_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEERR.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jli.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Management.Instrumentation.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libmad_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libremoteosd_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\weather.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libremap_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libcaf_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\awt.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libavi_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\liblogo_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\hxdsui.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACER3X.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jsound.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\UIAutomationClient.resources.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe 1840 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1464 WaterMark.exe Token: SeDebugPrivilege 1840 svchost.exe Token: SeDebugPrivilege 2160 rundll32.exe Token: SeDebugPrivilege 1464 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2092 rundll32mgr.exe 1464 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2204 wrote to memory of 2160 2204 rundll32.exe 31 PID 2160 wrote to memory of 2092 2160 rundll32.exe 32 PID 2160 wrote to memory of 2092 2160 rundll32.exe 32 PID 2160 wrote to memory of 2092 2160 rundll32.exe 32 PID 2160 wrote to memory of 2092 2160 rundll32.exe 32 PID 2092 wrote to memory of 1464 2092 rundll32mgr.exe 33 PID 2092 wrote to memory of 1464 2092 rundll32mgr.exe 33 PID 2092 wrote to memory of 1464 2092 rundll32mgr.exe 33 PID 2092 wrote to memory of 1464 2092 rundll32mgr.exe 33 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 2692 1464 WaterMark.exe 34 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1464 wrote to memory of 1840 1464 WaterMark.exe 35 PID 1840 wrote to memory of 256 1840 svchost.exe 1 PID 1840 wrote to memory of 256 1840 svchost.exe 1 PID 1840 wrote to memory of 256 1840 svchost.exe 1 PID 1840 wrote to memory of 256 1840 svchost.exe 1 PID 1840 wrote to memory of 256 1840 svchost.exe 1 PID 1840 wrote to memory of 332 1840 svchost.exe 2 PID 1840 wrote to memory of 332 1840 svchost.exe 2 PID 1840 wrote to memory of 332 1840 svchost.exe 2 PID 1840 wrote to memory of 332 1840 svchost.exe 2 PID 1840 wrote to memory of 332 1840 svchost.exe 2 PID 1840 wrote to memory of 380 1840 svchost.exe 3 PID 1840 wrote to memory of 380 1840 svchost.exe 3 PID 1840 wrote to memory of 380 1840 svchost.exe 3 PID 1840 wrote to memory of 380 1840 svchost.exe 3 PID 1840 wrote to memory of 380 1840 svchost.exe 3 PID 1840 wrote to memory of 392 1840 svchost.exe 4 PID 1840 wrote to memory of 392 1840 svchost.exe 4 PID 1840 wrote to memory of 392 1840 svchost.exe 4 PID 1840 wrote to memory of 392 1840 svchost.exe 4 PID 1840 wrote to memory of 392 1840 svchost.exe 4 PID 1840 wrote to memory of 428 1840 svchost.exe 5 PID 1840 wrote to memory of 428 1840 svchost.exe 5 PID 1840 wrote to memory of 428 1840 svchost.exe 5 PID 1840 wrote to memory of 428 1840 svchost.exe 5 PID 1840 wrote to memory of 428 1840 svchost.exe 5 PID 1840 wrote to memory of 472 1840 svchost.exe 6 PID 1840 wrote to memory of 472 1840 svchost.exe 6 PID 1840 wrote to memory of 472 1840 svchost.exe 6 PID 1840 wrote to memory of 472 1840 svchost.exe 6
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:380
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1988
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:616
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:2276
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:664
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:732
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:800
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1156
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:840
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:1632
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:1016
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1004
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1056
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:584
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2216
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:484
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633e02336a45e4fd40d46cfa554f999d.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633e02336a45e4fd40d46cfa554f999d.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5553d850aecde67247478a5aeddc4e512
SHA10befdcab0a32020f6813c5b7caac96878c612f96
SHA2569e12d3205c555294701c02701fb1e369bdc5f8d7d46a1a8555d9fa0d88171415
SHA512520e5db12ecbfe1791799e091b62274000ccbcd117aa014434fc1834e4f1c6128de139a743dc00b3855cc3582600aa7493edc7ee7c12c44817a6d6e40331a4a5
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize199KB
MD57df8e56ed025db6331e1ea4051a3c740
SHA1220a76312a7d1806d3d00d9b75e5c77199c141d0
SHA2565e658c76034ad795be4c154c229b6e0d73a57bf6a3d0111885328f7ef0be0441
SHA512d1c5a3c24cfb2f8f99dad68af14eab65e14724bfa7ab518bf273a6eed6bfde64bf7a3e7a8f4988ea28842bdd58c01e8c963f5237220b9d39c57577df029f7038
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize195KB
MD53363f07978b5008dac17fc9dfd65e828
SHA1a7506f2396a0c219cdbf28f1ad1734f2f3729139
SHA256fd0b81442372d665584df4a50fd0f38fd85532d1614bc912b92e65f64f761b9e
SHA51219d0a6b6bb15e6f03ae1584ca19e526a6369bf3773f5cf32f70d1a707342ebcc5358ada8f3dc579458b6c6c42870d95ae0d596a57f53e777178e753a10df6e0e