Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
d32a9dc1266d75024e2fc343f555c59b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d32a9dc1266d75024e2fc343f555c59b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d32a9dc1266d75024e2fc343f555c59b_JaffaCakes118.html
-
Size
27KB
-
MD5
d32a9dc1266d75024e2fc343f555c59b
-
SHA1
d64bd58e545c2c5336f23e2cf43f327807a9740b
-
SHA256
e6eae3503c89b7ee109bda4ef04f4d99b491584c10cb2fad4880b0ce1f5de06b
-
SHA512
2781c15ba3426292bc0ef57e4566e07247369a75d0c1a8472d4bdec191c8cd19dcf204645e8dc71908cdd368094e50ad685a3098be7ee097f0cf755105f89489
-
SSDEEP
768:NtzYSUZH8yS2j+h5zb4bu0P0NWHWYOYxmC9BhKy:NtUSUB8yS2jwxb4bu0PsSBhKy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6ADAEC81-6D7B-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000bcd4adb6f39f1935ca84de8765924cfa424fc020c576644fa0be819b42611eda000000000e8000000002000020000000e86ad8af10d6d656f70c29c2ef46109a5adf9eedcc910c46110fc766cc1ad2d690000000f8550f3b06081e557ae9f57641bae53154b118aca7a16b5f118b422046f2be3dc74a87c2f3a76b78837f8a5f78621b5091385cad9554257b224fec97e4a6f9bbf2902d19222f40d2b6ca889818053dbb0177b61e022e2bc52ff070fb8c718eeb9ff2ad5f703e9f977c77fd40ae93713cfb3c7c49d6a9489573d6c3da73ab32cdafb82694f562dd9b78d06aaf272f0aa1400000006640623c2796b68d9da00a3f5dd0a434ef570dc422ff4f4c3d459d9a11c9d0a841774fab355a4d0abca551db7f75ffad935088fcbee0f41ea162b8cb7da94ed8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431918099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006d73cc474bcf521d3da70f63bc59e7d34eb58acf8a63131f98be046da6277e77000000000e8000000002000020000000c15fac751ce07ab0a6c2dfda53e7c4eb1505b85251665bba19e8bf9354a303dd20000000802b92f6de27151dab1f0bb89de3d62a57a1cdb7eec5e1b186d948206e0cf7a1400000009bdcb2a1744a4b4112490f2fdba289d088f7a8bf958ccc6beae8e315da7c60c7c44486c0b81d0dbe496cd975b57ed19ca5cc692987eb8311b33f585fd019e0dc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9083fa448801db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d32a9dc1266d75024e2fc343f555c59b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14a9a6dc439252e985a99d53225ecd7
SHA16da7070c3d2a44b590978e3d2d2a9ddcbf516228
SHA256c48f351a31705d875e31d841d9e5c34c0bc5467b768e9592dab0cc924f4f6fdc
SHA51257786d67f0191540239fc59e03cffb127ddda2152bc5dd1bac5b1954536d08b9edafa7fd61ed81a571c569f226a0aa1e5316a05881947c5599d089b829250cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0dac204a0cb095385cc76274c6e279c
SHA160d51c0104f933e59e348da74c692c6d8be1cc34
SHA256567334bc6f6f6bfe2c11d9f01ee583ec8fc6df89c2f1dd74e8fa917c60d911ae
SHA512cbdada32de4064baef185cdf99b217138ed2071a364a6560992c9dc2f1289c0f000aecbb74313b0488536bd778d6e4c93e603aa8a220a955f0e439afdf9dae82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afda994c1a21d5c50089fdf731611158
SHA15e0b3894e65b6bd9df70322642f839ff6f866021
SHA256fd6ed7b9cdb92a97daade618dd50bea0de0c4edead52a426d407c7801fa5d4ca
SHA5129611f3b968fce69c039d710cd08e9c910260927d326a4ce080af04cff60a849df367cf4fc416d8ac32572fc226ddd43f0f04fe22f34431addd7e66d37a92eac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec9729a8ff1b818af2c56d48644c1ad
SHA104a39c199c8ebee2bbf426eaf473ffe2b2973779
SHA256f75bd8941a19c52e6d3a90ba5384f90a505c81219f28b0a02f04dbcfc94c7e4a
SHA5127a9f12ac714bec38d8a2183ced4b90cd7ffc613e15facb8bccd64e3622dfe38a443397e43cae600df27387d4f83fef7fe0a6dd4465d0d540639fd9c42da38f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b965dff5331063a26761adcf542ca2
SHA18113c65a2bebfbf2a164acfcb43b45129f0fbdaa
SHA256bb9c23de715c3e6632ef3767bbe442f7231f85ce2d329e6c22b91c38f3c2359d
SHA512c90db402351b725d9627c555fb34bd2f1da80133445620719ff52c1ae8e6062c6227449a5540e5529835d41cbb9b81935d4e44c164a1525b9e16e31fe181cb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faac18e352195c39a704ff18cc9603be
SHA1c03b8b8f3b6bd38812b95dfa9c4ce75f81156892
SHA256865d88a271f8abee6d5cbd898d3f042ccb6f10e2e669c7b07f3cb59cf70a703d
SHA5127592b59f1f3841b03fc899a69e7963269a7a68882e167819c4998729c3123b9f0171becb77cd3a15e697f44623b47d082c58a4132ec857a9ac9de358717461e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f723c5772f670218e92dcab2bd7ca6c1
SHA1dc2076fe2177a84848d62c9d9a018ee93d9f9108
SHA256181dd2f635df88e48b29bf37cf7310f02ff89da083cef8c189b20bc36f1847c0
SHA5120d8dd76de0cc7ee72101d085d0a54c8fae29df02590a1098f8ca42530b01010252da989b5ada9264ea95de9524ec885ab57d1951099aa28a1204633d3f779c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879e9c9426ad810a71cf84291169096d
SHA176973bc0ffed7a02c77e2b95ad21f39270634b8a
SHA2565044d18012333ee033f6f31141ef0d58abad90bd15bdc6a6ccd6e09f7075b788
SHA5127880dfc79f86c064512b0a25ba7952c225a642979b59a4e1d2fcb53d82b46c85d01c7913a85f21b077e8c1174a533b56c2a7ba2c284d11dcd0f602106513c676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ac257fcc1e24b7dfe1d31af2841f68
SHA16dbbf72443240f2b504a7ed6dc262212457f3a1a
SHA256bffd6a07e1addeeda9be6ec77c083f2008a22efdcd17d776c5c987629010b127
SHA5126a0192fb967a5d3102b3ca12c76e17ae7d73ab19478128a0278f7088ae8b8762a14477a231fd28e3904970dd68abc107ca2b5761363a4ad9a6957d6e1cdb9cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59724785af5a1256bddc2db73a98e708d
SHA1b3ab263f63df28b9d2093a2ff5604e3e618476fc
SHA25619ac3ced37cbba3c7507e7c301ced41e907233e4e2c55bf57c21271e51768172
SHA512e03d46a2f02af30609a65bcf14e511db875a1342859f0b640afd4a8d6d91d9f03881dd39a757b44c5cb782274f6c8f56bcc925790037b8f3abe44858a3df9a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50208f1850124c9e0daaa97a585622422
SHA13c7282153c3d79c2b25ffa01c374d6e2c9dd5336
SHA256eeb0a9c51932327024cb86e34a093631fa72f8ac0d3323b1c1d2f04596c12c2c
SHA512433f3c7016349da2ce85afd3402615079e28ff8509f59444d9f495b5959f82d01e974f4ab42f1c3712407fcbd121bd1916aa6c4f82c7beb0a02b7e3854318ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beae68cf8bc29f49fd1a241d36a3bfec
SHA1fa20c61ca96296422339c37406996c11741f6338
SHA256e773a9c82309b9fb0ca3a44b921205e08e7b6377e5ceb96835a39d83f689a76f
SHA512d5848af828ab67fffd5b21af8ff1cf36639183adbc7def586468dc10eaa5a563f264dc1c78d05ba56358a1ad7b2b00c3e9d580281b3d01c0ab2b31f033f1f7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f479b40a8aeb2f92a2703c6fd7c8161b
SHA1667cfc039c0cb8f92b0187881e7e4e8d7cbdc36a
SHA256b3f3dedd5d3b007a2001ed82345564179d6e8dc2c5304173e565de49adb93874
SHA5123e80e6ad7c944b8cbe5a1d0c689f035ad551dc8175a02e13a89e2c31b7ae83cc70a185f3aa1e87a5ce23187e89d89c1a93fc7160b14c2de74a40a45c0836864f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12afe78b956b6fc2c0a120af071bc7d
SHA14e9363153f51adcdae29f1c939b19cb8f8d5e968
SHA256a587597bd07d7aa99333615ad910656f0e393c534458ae6d9e245b2d740a8b5c
SHA51243744b8cd667d0100153fc3efc359e845009738ed17b4e95989fc09e724292e2964802a2ba1bdc51893ac352efd859d7959bf288845b2c9fe5806ed9a2a36ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c4e496b800a7e9730662c30b40fadc
SHA1865bf8d66579eb55eb03490175ad52dc10253326
SHA256c3df3f456988f959aa66013c2f7e1e54fccb836cefb94374edda72dc0de76b2a
SHA512e4fe590f816559a5d67b9d499790caa991074dcb8d0cf6684310a037b618fb5ce055dedc0a1b9eb61828f335056445261a4d9d4fbb97ec3c4d7091c86a5ac591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d8a07e05dd3c352ff7288cc4e7592a
SHA10c4510986cf32ab791ddfdc33e8866d886227814
SHA256cfa023f1ede5d5e02475b7f1854f6daf1e9fe04470ef553dc60e2d6755160516
SHA512c0ec32ae46c28cc6ecad5fbf444a17d3d1008428683d66ccb2966b9f8beff3e596a7dd7858a91aea7e3c0ba51a161f7db378fb78182083658e4a07b62f208ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97b820cc9b82bf3bfbea1a6e58bc274
SHA1658ba881cbf3857611aa95406ca1115413b63f90
SHA256ae88a8c258a6abd47d83b447fe47744346ea0d68a79f60ec2fd3595e239385a6
SHA5126a0ae80ef85dba8f95a023b9c3cea8721d78b8cba6d5f440e50db66d113b3725727303571e8ed6d883f06c309082e2db6d68fcbfb937f6e310548f5ac5acbb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaec7c1a84a010e707d8694167be31f4
SHA14e484322bef4d27b6b07c6bc79e32de48197cbd3
SHA25636414f6053aec79a4c1bb05cb0b667790f5da0ff53c03b0b6857e2f315520ed9
SHA5120e996872ffeae3de9c97fa5bf0caa5b470101c8d2b6c3afcb66faeb9a0271057499de7a58545c1802db9075e68f0f99e12b02d6f842d4c156ccde09234ae48a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d16c85370b6966e2b40dd050777dd1
SHA1c010d654c8d2c9f992b354789123274091c3779e
SHA256fd06d574580843706893b37f0d224d89e5392435241b36899ce2335bf2fd9cf1
SHA512ee5817ab230cb792910b95c130dc2302012c75f4f191d57ad4806359187fdc36e2fa69292207b9c7716b329a3852d95489ea0ffc703473620fcd78769e6f154c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e919b966c04b9e57974dae378e7fff67
SHA17f78bf8013e7351c37cfbd3b87673aa511ce9aaa
SHA25625c6bdef02a0b7d2d8d11da7fda4a132d39efc6b1ae3585b514d221da2542ef6
SHA5123f707086ebcc39c94147e0bce0cd410ffb0b8a40a53591d9b74f7a08614fdbd0d4c56043a013c56dbd0262c6e91073bceb933de80cd39599eb28b9e5672ce5e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\Tipos-de-tratamento-tintura1[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b