Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe
-
Size
95KB
-
MD5
5759041a8842e01a3aa7c7b9e03417ca
-
SHA1
d788f78a2faf4465a5acddeec323aceaa091ab9b
-
SHA256
2d23e48229d6182ab13bfb158ec087c7c9997fe3135de941fb59151ebdc7e1e3
-
SHA512
361d739162f189819770be45c59a1ab7dfa31c3dbe77a44d13ac4755fc5e1cdc97eeff00c2f09adf841f19d20db55143c1e762486a70c54098ed527f64da401f
-
SSDEEP
768:A06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:OR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 1424 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2928-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1424-30-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1424-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1424-26-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2928-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-5-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1424-78-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1424-584-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeUpdater.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\F12.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\mlib_image.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\splashscreen.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libcache_read_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdcp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_dirac_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_wasapi_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libfps_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\deploy.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libripple_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspatialaudio_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL svchost.exe File opened for modification C:\Program Files\Internet Explorer\DiagnosticsTap.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-conio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\nssckbi.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.DataSetExtensions.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtextst_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libwebvtt_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_mpjpeg_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libpng_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdirectory_demux_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_description_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libcache_block_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgradfun_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ahclient.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\license.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\fxplugins.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnsv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_mpegaudio_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_chromaprint_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\currency.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libremoteosd_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msador15.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\hxdsui.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACEINTL.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libd3d11va_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtwolame_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsubtitle_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 1424 WaterMark.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1424 WaterMark.exe Token: SeDebugPrivilege 2216 svchost.exe Token: SeDebugPrivilege 1424 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 1424 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1424 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 30 PID 2928 wrote to memory of 1424 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 30 PID 2928 wrote to memory of 1424 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 30 PID 2928 wrote to memory of 1424 2928 JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe 30 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2752 1424 WaterMark.exe 31 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 1424 wrote to memory of 2216 1424 WaterMark.exe 32 PID 2216 wrote to memory of 256 2216 svchost.exe 1 PID 2216 wrote to memory of 256 2216 svchost.exe 1 PID 2216 wrote to memory of 256 2216 svchost.exe 1 PID 2216 wrote to memory of 256 2216 svchost.exe 1 PID 2216 wrote to memory of 256 2216 svchost.exe 1 PID 2216 wrote to memory of 336 2216 svchost.exe 2 PID 2216 wrote to memory of 336 2216 svchost.exe 2 PID 2216 wrote to memory of 336 2216 svchost.exe 2 PID 2216 wrote to memory of 336 2216 svchost.exe 2 PID 2216 wrote to memory of 336 2216 svchost.exe 2 PID 2216 wrote to memory of 384 2216 svchost.exe 3 PID 2216 wrote to memory of 384 2216 svchost.exe 3 PID 2216 wrote to memory of 384 2216 svchost.exe 3 PID 2216 wrote to memory of 384 2216 svchost.exe 3 PID 2216 wrote to memory of 384 2216 svchost.exe 3 PID 2216 wrote to memory of 396 2216 svchost.exe 4 PID 2216 wrote to memory of 396 2216 svchost.exe 4 PID 2216 wrote to memory of 396 2216 svchost.exe 4 PID 2216 wrote to memory of 396 2216 svchost.exe 4 PID 2216 wrote to memory of 396 2216 svchost.exe 4 PID 2216 wrote to memory of 432 2216 svchost.exe 5 PID 2216 wrote to memory of 432 2216 svchost.exe 5 PID 2216 wrote to memory of 432 2216 svchost.exe 5 PID 2216 wrote to memory of 432 2216 svchost.exe 5 PID 2216 wrote to memory of 432 2216 svchost.exe 5 PID 2216 wrote to memory of 476 2216 svchost.exe 6 PID 2216 wrote to memory of 476 2216 svchost.exe 6 PID 2216 wrote to memory of 476 2216 svchost.exe 6 PID 2216 wrote to memory of 476 2216 svchost.exe 6 PID 2216 wrote to memory of 476 2216 svchost.exe 6 PID 2216 wrote to memory of 492 2216 svchost.exe 7 PID 2216 wrote to memory of 492 2216 svchost.exe 7 PID 2216 wrote to memory of 492 2216 svchost.exe 7 PID 2216 wrote to memory of 492 2216 svchost.exe 7 PID 2216 wrote to memory of 492 2216 svchost.exe 7 PID 2216 wrote to memory of 500 2216 svchost.exe 8 PID 2216 wrote to memory of 500 2216 svchost.exe 8 PID 2216 wrote to memory of 500 2216 svchost.exe 8 PID 2216 wrote to memory of 500 2216 svchost.exe 8 PID 2216 wrote to memory of 500 2216 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1588
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1676
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:760
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1156
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:856
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2664
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:272
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:292
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1224
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2612
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5759041a8842e01a3aa7c7b9e03417ca.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD55759041a8842e01a3aa7c7b9e03417ca
SHA1d788f78a2faf4465a5acddeec323aceaa091ab9b
SHA2562d23e48229d6182ab13bfb158ec087c7c9997fe3135de941fb59151ebdc7e1e3
SHA512361d739162f189819770be45c59a1ab7dfa31c3dbe77a44d13ac4755fc5e1cdc97eeff00c2f09adf841f19d20db55143c1e762486a70c54098ed527f64da401f
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize204KB
MD565eb8d3c61cb03dd02e3bc19b62242bb
SHA174bb34b24a8c5aedcd0e444cc453e9a10ba6b5b4
SHA2565b512c2276b8042e023d811f9da59b88aa82e11e48143b89f6d7819dbb2e72a1
SHA512a41f36506d7e91ee4b97e77624b85492432046a52b8cb2093f95a3afb21534d0df171937e0b73b48a3f8c61fdad590a47d770427180462266762dea4ae705476
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize200KB
MD56534bb021e67c3726f5992e94316e717
SHA10a7c0823a1169fd4c57ab8ec0214a188ecef41bb
SHA2566c7790522c68b21d23081cdd81c2870d8ef92548ff06f45fcc507ae07c48dd2d
SHA51267e67706d49874430436f108aea9d382ec3acc45adec682d6e8c3f1d01bec5a6c693d3c62440ffef705d4646db40252341c646fb986eedd20a9e873da45e730c