Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe
-
Size
95KB
-
MD5
13b7962a5fe685f36e825ee6ad0c4852
-
SHA1
5307c0380dd37c2a10b7dd6de8e33a9504beb70b
-
SHA256
1427b7a98073f65fc4c995fd04853bee9b3dd41cc26e0cb9ea5fb8cd8c7dd65f
-
SHA512
5144a573534957f94426751eab0f8a8df2a16808b782f2d8c4229fc7f33b4d55be25924460c3f0d2b77a5ff3fa592582f23391689b3ced0f8c3874495cb5b2c6
-
SSDEEP
768:206R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:UR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2388 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2004-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2004-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-60-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-71-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2388-587-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationBuildTasks.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libschroedinger_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkObj.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libcdda_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libtimecode_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcanvas_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\slideShow.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\perf_nt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tpcps.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcfr.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libspudec_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\InkSeg.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEOLEDB.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmosaic_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\splashscreen.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libhotkeys_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jli.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe svchost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Management.Instrumentation.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_dirac_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libgnutls_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSSOAP30.DLL svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\libGLESv2.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.IdentityModel.Selectors.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsmb_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODTXT.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS.DLL svchost.exe File opened for modification C:\Program Files\Internet Explorer\DiagnosticsTap.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\JSProfilerCore.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_asf_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\nio.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.DataSetExtensions.Resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\wlsrvc.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\imjplm.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ahclient.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2388 WaterMark.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2388 WaterMark.exe Token: SeDebugPrivilege 2756 svchost.exe Token: SeDebugPrivilege 2388 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 2388 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2388 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 30 PID 2004 wrote to memory of 2388 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 30 PID 2004 wrote to memory of 2388 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 30 PID 2004 wrote to memory of 2388 2004 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 30 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2892 2388 WaterMark.exe 31 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2388 wrote to memory of 2756 2388 WaterMark.exe 32 PID 2756 wrote to memory of 256 2756 svchost.exe 1 PID 2756 wrote to memory of 256 2756 svchost.exe 1 PID 2756 wrote to memory of 256 2756 svchost.exe 1 PID 2756 wrote to memory of 256 2756 svchost.exe 1 PID 2756 wrote to memory of 256 2756 svchost.exe 1 PID 2756 wrote to memory of 336 2756 svchost.exe 2 PID 2756 wrote to memory of 336 2756 svchost.exe 2 PID 2756 wrote to memory of 336 2756 svchost.exe 2 PID 2756 wrote to memory of 336 2756 svchost.exe 2 PID 2756 wrote to memory of 336 2756 svchost.exe 2 PID 2756 wrote to memory of 384 2756 svchost.exe 3 PID 2756 wrote to memory of 384 2756 svchost.exe 3 PID 2756 wrote to memory of 384 2756 svchost.exe 3 PID 2756 wrote to memory of 384 2756 svchost.exe 3 PID 2756 wrote to memory of 384 2756 svchost.exe 3 PID 2756 wrote to memory of 396 2756 svchost.exe 4 PID 2756 wrote to memory of 396 2756 svchost.exe 4 PID 2756 wrote to memory of 396 2756 svchost.exe 4 PID 2756 wrote to memory of 396 2756 svchost.exe 4 PID 2756 wrote to memory of 396 2756 svchost.exe 4 PID 2756 wrote to memory of 432 2756 svchost.exe 5 PID 2756 wrote to memory of 432 2756 svchost.exe 5 PID 2756 wrote to memory of 432 2756 svchost.exe 5 PID 2756 wrote to memory of 432 2756 svchost.exe 5 PID 2756 wrote to memory of 432 2756 svchost.exe 5 PID 2756 wrote to memory of 476 2756 svchost.exe 6 PID 2756 wrote to memory of 476 2756 svchost.exe 6 PID 2756 wrote to memory of 476 2756 svchost.exe 6 PID 2756 wrote to memory of 476 2756 svchost.exe 6 PID 2756 wrote to memory of 476 2756 svchost.exe 6 PID 2756 wrote to memory of 492 2756 svchost.exe 7 PID 2756 wrote to memory of 492 2756 svchost.exe 7 PID 2756 wrote to memory of 492 2756 svchost.exe 7 PID 2756 wrote to memory of 492 2756 svchost.exe 7 PID 2756 wrote to memory of 492 2756 svchost.exe 7 PID 2756 wrote to memory of 500 2756 svchost.exe 8 PID 2756 wrote to memory of 500 2756 svchost.exe 8 PID 2756 wrote to memory of 500 2756 svchost.exe 8 PID 2756 wrote to memory of 500 2756 svchost.exe 8 PID 2756 wrote to memory of 500 2756 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1660
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:852
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:812
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1172
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:836
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:1152
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:108
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1068
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1512
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2528
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2484
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD513b7962a5fe685f36e825ee6ad0c4852
SHA15307c0380dd37c2a10b7dd6de8e33a9504beb70b
SHA2561427b7a98073f65fc4c995fd04853bee9b3dd41cc26e0cb9ea5fb8cd8c7dd65f
SHA5125144a573534957f94426751eab0f8a8df2a16808b782f2d8c4229fc7f33b4d55be25924460c3f0d2b77a5ff3fa592582f23391689b3ced0f8c3874495cb5b2c6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize204KB
MD5e66d35614e66db4eba54df098b44f71e
SHA130826e91745bc8b26af47b27cfae109df81ba674
SHA2561a83be11023da666045f02bf60cf018940084b54dff3bab4bf5e044a822fb9ad
SHA512171ff41b73a284d0c00dc2b315d93ebda24e4844fb8c4af04a9a6d394702f515b0f4bd3c212d63f77b35270f3c0356ba4e7ddda61ad213ae9516fb95df6e9477
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize200KB
MD526b090123ceabc593abfec70cecc185d
SHA1ce6c7f3040cec520c791fd6c4c1798ae64676804
SHA256101045fe82f7246ec7f44100206df2f651762e2c1bdf140586dba8d38febd95f
SHA5129a096dfb5d72e237bf63fda7d652dcae067dff8108a2aca5cc2fe3c994ef8e820776591f1099ab57ed67e275c836f9827846c9b536bd3c8f47eb71fd89e128e3