Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe
-
Size
95KB
-
MD5
82f3b719cff14c36717975a0f02bb25c
-
SHA1
e4ebf77eae12c09f3fdecb7f665ae293b60b64a2
-
SHA256
196cfbe576c33b37214e4833dad773a1c861a778649bbd7ef280e640b2a436ed
-
SHA512
a32e82b9d62ed0c7a848ce78a943f9bea098b7b70b81ac14f92ea9f42bd07c72325317e15897d9b16d96f743864ddf9de727c96bbf280ec08792ca449b235844
-
SSDEEP
768:106R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:jR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2816 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2660-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2660-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-57-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-68-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-595-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_mmx_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\InkDiv.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\instrument.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\deploy.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\glass.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libvdr_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_10_p010_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\ITIRCL55.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\axvlc.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscale_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipBand.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaom_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\librtpvideo_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_plugin.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\NPAUTHZ.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipRes.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprsr.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprst.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\javafx-iio.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\msvcr100.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libfile_keystore_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\libsap_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libswscale_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationBuildTasks.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Conversion.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\librist_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\mpvis.DLL svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\settings.html svchost.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtextst_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_cdg_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\libqt_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\librss_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libball_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\vulkan-1.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspatialaudio_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libaiff_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRdIF.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\settings.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\dao360.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkObj.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2816 WaterMark.exe Token: SeDebugPrivilege 1528 svchost.exe Token: SeDebugPrivilege 2816 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 2816 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2816 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 30 PID 2660 wrote to memory of 2816 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 30 PID 2660 wrote to memory of 2816 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 30 PID 2660 wrote to memory of 2816 2660 JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe 30 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 2876 2816 WaterMark.exe 31 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 2816 wrote to memory of 1528 2816 WaterMark.exe 32 PID 1528 wrote to memory of 256 1528 svchost.exe 1 PID 1528 wrote to memory of 256 1528 svchost.exe 1 PID 1528 wrote to memory of 256 1528 svchost.exe 1 PID 1528 wrote to memory of 256 1528 svchost.exe 1 PID 1528 wrote to memory of 256 1528 svchost.exe 1 PID 1528 wrote to memory of 332 1528 svchost.exe 2 PID 1528 wrote to memory of 332 1528 svchost.exe 2 PID 1528 wrote to memory of 332 1528 svchost.exe 2 PID 1528 wrote to memory of 332 1528 svchost.exe 2 PID 1528 wrote to memory of 332 1528 svchost.exe 2 PID 1528 wrote to memory of 380 1528 svchost.exe 3 PID 1528 wrote to memory of 380 1528 svchost.exe 3 PID 1528 wrote to memory of 380 1528 svchost.exe 3 PID 1528 wrote to memory of 380 1528 svchost.exe 3 PID 1528 wrote to memory of 380 1528 svchost.exe 3 PID 1528 wrote to memory of 388 1528 svchost.exe 4 PID 1528 wrote to memory of 388 1528 svchost.exe 4 PID 1528 wrote to memory of 388 1528 svchost.exe 4 PID 1528 wrote to memory of 388 1528 svchost.exe 4 PID 1528 wrote to memory of 388 1528 svchost.exe 4 PID 1528 wrote to memory of 428 1528 svchost.exe 5 PID 1528 wrote to memory of 428 1528 svchost.exe 5 PID 1528 wrote to memory of 428 1528 svchost.exe 5 PID 1528 wrote to memory of 428 1528 svchost.exe 5 PID 1528 wrote to memory of 428 1528 svchost.exe 5 PID 1528 wrote to memory of 472 1528 svchost.exe 6 PID 1528 wrote to memory of 472 1528 svchost.exe 6 PID 1528 wrote to memory of 472 1528 svchost.exe 6 PID 1528 wrote to memory of 472 1528 svchost.exe 6 PID 1528 wrote to memory of 472 1528 svchost.exe 6 PID 1528 wrote to memory of 488 1528 svchost.exe 7 PID 1528 wrote to memory of 488 1528 svchost.exe 7 PID 1528 wrote to memory of 488 1528 svchost.exe 7 PID 1528 wrote to memory of 488 1528 svchost.exe 7 PID 1528 wrote to memory of 488 1528 svchost.exe 7 PID 1528 wrote to memory of 496 1528 svchost.exe 8 PID 1528 wrote to memory of 496 1528 svchost.exe 8 PID 1528 wrote to memory of 496 1528 svchost.exe 8 PID 1528 wrote to memory of 496 1528 svchost.exe 8 PID 1528 wrote to memory of 496 1528 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:380
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:876
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1544
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:2780
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:832
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1184
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:860
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:268
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:544
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1052
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1128
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1180
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2148
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1932
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:388
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82f3b719cff14c36717975a0f02bb25c.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD582f3b719cff14c36717975a0f02bb25c
SHA1e4ebf77eae12c09f3fdecb7f665ae293b60b64a2
SHA256196cfbe576c33b37214e4833dad773a1c861a778649bbd7ef280e640b2a436ed
SHA512a32e82b9d62ed0c7a848ce78a943f9bea098b7b70b81ac14f92ea9f42bd07c72325317e15897d9b16d96f743864ddf9de727c96bbf280ec08792ca449b235844
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize204KB
MD51c618f9e00a57aa9708508365b8240c7
SHA10945478aca70f82ac6cbf8d0c182a840750b5938
SHA256100047ab103969a6c0f7f57ffad0dbc2c2cece8289ba714f85cfa33c07c2dfaa
SHA5124285929f5bae3b0d09062a49d35481615378e28687dff01a476c24095d17c82962b39b3e68af460d69d9978cba04dfc5ee2b464797fcc9cd1ebf6d61ab1c7786
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize200KB
MD50b40c8971c5f51ac753fc2aeb6c57192
SHA1748d09412d812f8a9f8fd049e4eae249026beb95
SHA256942b3ee0c2ab12880ebb5e2983e8c5039630365f5303a7c934565275587a0457
SHA5128c86f47a71ec89fbf2076bd1c52d86984c44942de5cf3c0329ea5a705ebd2072bc9a54d4f0d01b5ebc4de7717778837e73d9ef3b887e3f5df2dbf3d846d60317