Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 12:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe
-
Size
184KB
-
MD5
568c316139a4e7c91fc1e3f7cdb018e9
-
SHA1
e3573bdbdf809efd5fa803ea54c21693e5866985
-
SHA256
20bd108ac183273bad7742cca8cb32f4835ef4d9afa168f5c2d8ed05538c557d
-
SHA512
34d467fc960248aa465e542b4aece4047954bfb243b2b5a5f2d14ea54d9c0b41953d2d0cb0d3d5f9fed1355004bc53aa1449eda2aabc9ef0ab1287e1a87b01ed
-
SSDEEP
1536:oVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:4nxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2080 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/604-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/604-20-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-31-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-79-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-78-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2080-617-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmosaic_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libvhs_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\WMPNSSUI.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\slideShow.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdarem.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Acrofx32.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kcms.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Activities.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Xml.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemuxdump_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\setup_wm.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\odffilt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jaas_nt.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_rgb_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\wab.exe svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\MAPISHELLR.DLL svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-conio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Core.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libx265_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libzvbi_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODBC.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2iexp.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_stl_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libmemory_keystore_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_a52_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACECORE.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Net.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libjpeg_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libuleaddvaudio_plugin.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\networkinspection.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dt_socket.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libasf_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libhqdn3d_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\settings.html svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSCommon.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msadrh15.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\wab32.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java_crw_demo.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2native.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dt_socket.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmkv_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.resources.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 2080 WaterMark.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 WaterMark.exe Token: SeDebugPrivilege 1676 svchost.exe Token: SeDebugPrivilege 2080 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 2080 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 604 wrote to memory of 2080 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 31 PID 604 wrote to memory of 2080 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 31 PID 604 wrote to memory of 2080 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 31 PID 604 wrote to memory of 2080 604 JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe 31 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 2784 2080 WaterMark.exe 32 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 2080 wrote to memory of 1676 2080 WaterMark.exe 33 PID 1676 wrote to memory of 256 1676 svchost.exe 1 PID 1676 wrote to memory of 256 1676 svchost.exe 1 PID 1676 wrote to memory of 256 1676 svchost.exe 1 PID 1676 wrote to memory of 256 1676 svchost.exe 1 PID 1676 wrote to memory of 256 1676 svchost.exe 1 PID 1676 wrote to memory of 336 1676 svchost.exe 2 PID 1676 wrote to memory of 336 1676 svchost.exe 2 PID 1676 wrote to memory of 336 1676 svchost.exe 2 PID 1676 wrote to memory of 336 1676 svchost.exe 2 PID 1676 wrote to memory of 336 1676 svchost.exe 2 PID 1676 wrote to memory of 384 1676 svchost.exe 3 PID 1676 wrote to memory of 384 1676 svchost.exe 3 PID 1676 wrote to memory of 384 1676 svchost.exe 3 PID 1676 wrote to memory of 384 1676 svchost.exe 3 PID 1676 wrote to memory of 384 1676 svchost.exe 3 PID 1676 wrote to memory of 396 1676 svchost.exe 4 PID 1676 wrote to memory of 396 1676 svchost.exe 4 PID 1676 wrote to memory of 396 1676 svchost.exe 4 PID 1676 wrote to memory of 396 1676 svchost.exe 4 PID 1676 wrote to memory of 396 1676 svchost.exe 4 PID 1676 wrote to memory of 432 1676 svchost.exe 5 PID 1676 wrote to memory of 432 1676 svchost.exe 5 PID 1676 wrote to memory of 432 1676 svchost.exe 5 PID 1676 wrote to memory of 432 1676 svchost.exe 5 PID 1676 wrote to memory of 432 1676 svchost.exe 5 PID 1676 wrote to memory of 476 1676 svchost.exe 6 PID 1676 wrote to memory of 476 1676 svchost.exe 6 PID 1676 wrote to memory of 476 1676 svchost.exe 6 PID 1676 wrote to memory of 476 1676 svchost.exe 6 PID 1676 wrote to memory of 476 1676 svchost.exe 6 PID 1676 wrote to memory of 492 1676 svchost.exe 7 PID 1676 wrote to memory of 492 1676 svchost.exe 7 PID 1676 wrote to memory of 492 1676 svchost.exe 7 PID 1676 wrote to memory of 492 1676 svchost.exe 7 PID 1676 wrote to memory of 492 1676 svchost.exe 7 PID 1676 wrote to memory of 500 1676 svchost.exe 8 PID 1676 wrote to memory of 500 1676 svchost.exe 8 PID 1676 wrote to memory of 500 1676 svchost.exe 8 PID 1676 wrote to memory of 500 1676 svchost.exe 8 PID 1676 wrote to memory of 500 1676 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1424
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1296
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:2644
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:692
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:772
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1172
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:872
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2068
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:296
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:308
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2284
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1796
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_568c316139a4e7c91fc1e3f7cdb018e9.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize382KB
MD5ff68b1bae292a47dc7b63be66356be69
SHA14eba732ed6171636f3e8f173336900f871af5f1f
SHA256252d869d0a582fbf2558d3cd94265b2918ce9854702af4d62965cb8451f77fd1
SHA5125f52a2ebfe199cac5fed75302a1fc741a9b4e3a41c293025dbc57862a781ab856ae770a35bd1545374d12a2fb4c2e36ef7acdd6d74421a28262dbcd2cb1b28dc
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize378KB
MD51f947b8148d1a8a9e431964bd8fc1312
SHA1c7a893e2a78641d9dbd6a58ec11b37f8dacefc04
SHA2566184ca53ed3b5afc6145a1fea0bcf6dc484a0bf2308915be0e74010a4884188e
SHA5126f4165c58aa5cee19cab71fe40a6d35a108161e5e1bba8fd397a3300104c8e7ef3881d80451200ca1c992c03e3ddfcfb05d52702d2c791cfa447d732cbe4b01e
-
Filesize
184KB
MD5568c316139a4e7c91fc1e3f7cdb018e9
SHA1e3573bdbdf809efd5fa803ea54c21693e5866985
SHA25620bd108ac183273bad7742cca8cb32f4835ef4d9afa168f5c2d8ed05538c557d
SHA51234d467fc960248aa465e542b4aece4047954bfb243b2b5a5f2d14ea54d9c0b41953d2d0cb0d3d5f9fed1355004bc53aa1449eda2aabc9ef0ab1287e1a87b01ed