Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe
-
Size
92KB
-
MD5
9e9be5aa8b8d2d9d572e740cf1bd1f3f
-
SHA1
42d9a400e56b2fe5c32b77065f30d202dabcc4dc
-
SHA256
18dcecb997daebb1042c4366ce287b896bbe578ebd423a509a6dfcf039b4d1ac
-
SHA512
93d68215fd244d812d0e8fb5f376ea762ebf48a720a94fe9ddf6a40ac44ea8205e85b6769569486ccb8db356074bd005af1ca11f0e71cc0fac95638598764a56
-
SSDEEP
1536:jVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:7nxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 1404 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2428-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2428-17-0x0000000000050000-0x0000000000081000-memory.dmp upx behavioral1/memory/1404-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1404-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1404-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1404-61-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1404-72-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1404-609-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Routing.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libremoteosd_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\flyout.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\penkor.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\management.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\NAMEEXT.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Management.Instrumentation.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Xml.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libcdda_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libhotkeys_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnsv_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\slideShow.html svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadco.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\jsdebuggeride.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\cpu.html svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\MSCDM.DLL svchost.exe File opened for modification C:\Program Files\Internet Explorer\MemoryAnalyzer.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\profilerinterface.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Entity.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEEXCL.DLL svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSSOAP30.DLL svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\glass.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-runtime-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\settings.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Linq.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsid_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libsepia_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libps_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Csi.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdaosp.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\awt.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Extensions.Design.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_udp_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationBuildTasks.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.Speech.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libgnutls_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado15.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\npt.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.DynamicData.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuy2_i420_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\picturePuzzle.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\JavaAccessBridge-64.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\deploy.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libgme_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\splashscreen.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1404 WaterMark.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1404 WaterMark.exe Token: SeDebugPrivilege 1888 svchost.exe Token: SeDebugPrivilege 1404 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 1404 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1404 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 30 PID 2428 wrote to memory of 1404 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 30 PID 2428 wrote to memory of 1404 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 30 PID 2428 wrote to memory of 1404 2428 JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe 30 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 2772 1404 WaterMark.exe 31 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1404 wrote to memory of 1888 1404 WaterMark.exe 32 PID 1888 wrote to memory of 256 1888 svchost.exe 1 PID 1888 wrote to memory of 256 1888 svchost.exe 1 PID 1888 wrote to memory of 256 1888 svchost.exe 1 PID 1888 wrote to memory of 256 1888 svchost.exe 1 PID 1888 wrote to memory of 256 1888 svchost.exe 1 PID 1888 wrote to memory of 332 1888 svchost.exe 2 PID 1888 wrote to memory of 332 1888 svchost.exe 2 PID 1888 wrote to memory of 332 1888 svchost.exe 2 PID 1888 wrote to memory of 332 1888 svchost.exe 2 PID 1888 wrote to memory of 332 1888 svchost.exe 2 PID 1888 wrote to memory of 384 1888 svchost.exe 3 PID 1888 wrote to memory of 384 1888 svchost.exe 3 PID 1888 wrote to memory of 384 1888 svchost.exe 3 PID 1888 wrote to memory of 384 1888 svchost.exe 3 PID 1888 wrote to memory of 384 1888 svchost.exe 3 PID 1888 wrote to memory of 392 1888 svchost.exe 4 PID 1888 wrote to memory of 392 1888 svchost.exe 4 PID 1888 wrote to memory of 392 1888 svchost.exe 4 PID 1888 wrote to memory of 392 1888 svchost.exe 4 PID 1888 wrote to memory of 392 1888 svchost.exe 4 PID 1888 wrote to memory of 432 1888 svchost.exe 5 PID 1888 wrote to memory of 432 1888 svchost.exe 5 PID 1888 wrote to memory of 432 1888 svchost.exe 5 PID 1888 wrote to memory of 432 1888 svchost.exe 5 PID 1888 wrote to memory of 432 1888 svchost.exe 5 PID 1888 wrote to memory of 476 1888 svchost.exe 6 PID 1888 wrote to memory of 476 1888 svchost.exe 6 PID 1888 wrote to memory of 476 1888 svchost.exe 6 PID 1888 wrote to memory of 476 1888 svchost.exe 6 PID 1888 wrote to memory of 476 1888 svchost.exe 6 PID 1888 wrote to memory of 492 1888 svchost.exe 7 PID 1888 wrote to memory of 492 1888 svchost.exe 7 PID 1888 wrote to memory of 492 1888 svchost.exe 7 PID 1888 wrote to memory of 492 1888 svchost.exe 7 PID 1888 wrote to memory of 492 1888 svchost.exe 7 PID 1888 wrote to memory of 500 1888 svchost.exe 8 PID 1888 wrote to memory of 500 1888 svchost.exe 8 PID 1888 wrote to memory of 500 1888 svchost.exe 8 PID 1888 wrote to memory of 500 1888 svchost.exe 8 PID 1888 wrote to memory of 500 1888 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:612
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:812
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1288
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:768
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:860
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2816
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:296
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:920
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1080
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1572
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2232
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2280
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e9be5aa8b8d2d9d572e740cf1bd1f3f.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59e9be5aa8b8d2d9d572e740cf1bd1f3f
SHA142d9a400e56b2fe5c32b77065f30d202dabcc4dc
SHA25618dcecb997daebb1042c4366ce287b896bbe578ebd423a509a6dfcf039b4d1ac
SHA51293d68215fd244d812d0e8fb5f376ea762ebf48a720a94fe9ddf6a40ac44ea8205e85b6769569486ccb8db356074bd005af1ca11f0e71cc0fac95638598764a56
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize197KB
MD586e414f3f2e35fa5d94c1bf0467c57e5
SHA1336f8fdaf74c99ad469c1e21dfb4ac10436a448d
SHA2560c736d06a987f73bf4d2085a4a3921674e8cc5270dc958b2365ff367520a2259
SHA512105d3496e064aba5f086721f053084d038678de52d952ada6c888bb69542281252c3482a3999dc1e9eb51ab9f9248073e992babead6d4202b8acf6fe67adc35b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize193KB
MD5ccd4bd966ef993106546549ba21c7e5b
SHA1875e7f0dfc9b9e6ae8d8a218b0898f564496f105
SHA2567bc3eecb8f2c8bb4b0cb0b82671640c73fb24d6b8c925ff63ac50c09f1b01841
SHA5123954390673d5304ef4523b913b3cf5d06f0b7f046c8aeaf092d681a0531837153716f00b7e2bb08274de5bb0660d7e2ecbdfcfa20661c0440b3b1ff9b3bf6361