Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 01:37 UTC

General

  • Target

    29a650d730f10991ea1ecdbe2e1563c2_JaffaCakes118.html

  • Size

    308B

  • MD5

    29a650d730f10991ea1ecdbe2e1563c2

  • SHA1

    2f1f107efbcf2b9c3fef10718c96bae746eff837

  • SHA256

    8e5bb8b29e88597812844a60340794166b3087552c5e8611e7cb1edc6c404096

  • SHA512

    701b2ece282143bbccf1774bd99a55a3ef5fad4fb5d1368338881f4b9ef099ef596057d3bdc79f2a4158026fbcf8b52e8547c3147e4a839e211d085d275acfc9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29a650d730f10991ea1ecdbe2e1563c2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

  • flag-us
    DNS
    togialinogovaki.gr
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    togialinogovaki.gr
    IN A
    Response
    togialinogovaki.gr
    IN A
    78.47.210.44
  • flag-us
    DNS
    mzimmer.at
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    mzimmer.at
    IN A
    Response
  • flag-us
    DNS
    utrip.in
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    utrip.in
    IN A
    Response
    utrip.in
    IN A
    3.33.130.190
    utrip.in
    IN A
    15.197.148.33
  • flag-us
    GET
    http://utrip.in/dNqLqNmf/js.js
    IEXPLORE.EXE
    Remote address:
    3.33.130.190:80
    Request
    GET /dNqLqNmf/js.js HTTP/1.1
    Accept: application/javascript, */*;q=0.8
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: utrip.in
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: openresty
    Date: Sun, 07 Jul 2024 04:14:42 GMT
    Content-Type: text/html
    Content-Length: 114
    Connection: keep-alive
  • flag-de
    GET
    http://togialinogovaki.gr/xPnTntDK/js.js
    IEXPLORE.EXE
    Remote address:
    78.47.210.44:80
    Request
    GET /xPnTntDK/js.js HTTP/1.1
    Accept: application/javascript, */*;q=0.8
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: togialinogovaki.gr
    Connection: Keep-Alive
    Response
    HTTP/1.1 301 Moved Permanently
    Connection: Keep-Alive
    Keep-Alive: timeout=5, max=100
    x-powered-by: PHP/7.2.34
    content-type: text/html; charset=UTF-8
    expires: Wed, 11 Jan 1984 05:00:00 GMT
    cache-control: no-cache, must-revalidate, max-age=0
    x-redirect-by: WordPress
    location: https://togialinogovaki.gr/xPnTntDK/js.js
    content-length: 0
    date: Sun, 07 Jul 2024 04:14:40 GMT
    server: LiteSpeed
  • flag-de
    GET
    https://togialinogovaki.gr/xPnTntDK/js.js
    IEXPLORE.EXE
    Remote address:
    78.47.210.44:443
    Request
    GET /xPnTntDK/js.js HTTP/1.1
    Accept: application/javascript, */*;q=0.8
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: togialinogovaki.gr
    Connection: Keep-Alive
    Response
    HTTP/1.1 301 Moved Permanently
    Connection: Keep-Alive
    Keep-Alive: timeout=5, max=100
    x-powered-by: PHP/7.2.34
    content-type: text/html; charset=UTF-8
    expires: Wed, 11 Jan 1984 05:00:00 GMT
    cache-control: no-cache, must-revalidate, max-age=0
    x-redirect-by: WordPress
    location: https://www.togialinogovaki.gr/xPnTntDK/js.js
    content-length: 0
    date: Sun, 07 Jul 2024 04:14:42 GMT
    server: LiteSpeed
    alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
  • flag-us
    DNS
    mzimmer.at
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    mzimmer.at
    IN A
    Response
  • flag-us
    DNS
    www.togialinogovaki.gr
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.togialinogovaki.gr
    IN A
    Response
    www.togialinogovaki.gr
    IN CNAME
    togialinogovaki.gr
    togialinogovaki.gr
    IN A
    78.47.210.44
  • flag-de
    GET
    https://www.togialinogovaki.gr/xPnTntDK/js.js
    IEXPLORE.EXE
    Remote address:
    78.47.210.44:443
    Request
    GET /xPnTntDK/js.js HTTP/1.1
    Accept: application/javascript, */*;q=0.8
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: www.togialinogovaki.gr
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Connection: Keep-Alive
    Keep-Alive: timeout=5, max=100
    x-powered-by: PHP/7.2.34
    content-type: text/html; charset=UTF-8
    expires: Wed, 11 Jan 1984 05:00:00 GMT
    cache-control: no-cache, must-revalidate, max-age=0
    link: <https://www.togialinogovaki.gr/wp-json/>; rel="https://api.w.org/"
    transfer-encoding: chunked
    content-encoding: gzip
    vary: Accept-Encoding
    date: Sun, 07 Jul 2024 04:14:43 GMT
    server: LiteSpeed
    alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
  • 3.33.130.190:80
    http://utrip.in/dNqLqNmf/js.js
    http
    IEXPLORE.EXE
    581 B
    770 B
    7
    6

    HTTP Request

    GET http://utrip.in/dNqLqNmf/js.js

    HTTP Response

    200
  • 78.47.210.44:80
    http://togialinogovaki.gr/xPnTntDK/js.js
    http
    IEXPLORE.EXE
    821 B
    1.0kB
    12
    5

    HTTP Request

    GET http://togialinogovaki.gr/xPnTntDK/js.js

    HTTP Response

    301
  • 78.47.210.44:80
    togialinogovaki.gr
    IEXPLORE.EXE
    518 B
    144 B
    11
    3
  • 3.33.130.190:80
    utrip.in
    IEXPLORE.EXE
    190 B
    132 B
    4
    3
  • 78.47.210.44:443
    https://togialinogovaki.gr/xPnTntDK/js.js
    tls, http
    IEXPLORE.EXE
    1.2kB
    6.8kB
    12
    12

    HTTP Request

    GET https://togialinogovaki.gr/xPnTntDK/js.js

    HTTP Response

    301
  • 78.47.210.44:443
    www.togialinogovaki.gr
    tls
    IEXPLORE.EXE
    829 B
    6.2kB
    11
    11
  • 78.47.210.44:443
    https://www.togialinogovaki.gr/xPnTntDK/js.js
    tls, http
    IEXPLORE.EXE
    1.4kB
    19.1kB
    16
    20

    HTTP Request

    GET https://www.togialinogovaki.gr/xPnTntDK/js.js

    HTTP Response

    404
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    799 B
    7.8kB
    10
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    785 B
    7.8kB
    9
    13
  • 8.8.8.8:53
    togialinogovaki.gr
    dns
    IEXPLORE.EXE
    64 B
    80 B
    1
    1

    DNS Request

    togialinogovaki.gr

    DNS Response

    78.47.210.44

  • 8.8.8.8:53
    mzimmer.at
    dns
    IEXPLORE.EXE
    56 B
    56 B
    1
    1

    DNS Request

    mzimmer.at

  • 8.8.8.8:53
    utrip.in
    dns
    IEXPLORE.EXE
    54 B
    86 B
    1
    1

    DNS Request

    utrip.in

    DNS Response

    3.33.130.190
    15.197.148.33

  • 8.8.8.8:53
    mzimmer.at
    dns
    IEXPLORE.EXE
    56 B
    56 B
    1
    1

    DNS Request

    mzimmer.at

  • 8.8.8.8:53
    www.togialinogovaki.gr
    dns
    IEXPLORE.EXE
    68 B
    98 B
    1
    1

    DNS Request

    www.togialinogovaki.gr

    DNS Response

    78.47.210.44

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a5457c1cd5cd0f6e6d8d7d3d9d94722

    SHA1

    5cdcc5108b151ed8718ee03cd9974cb7a0b7bb9d

    SHA256

    ddd78a466e34451ccb528010af545d97c932cc73c9e8e76248fc38d36b0b2170

    SHA512

    fd840cdf8fa8de8f623e35a60ba74993557747cf5ca5212a89b28e4564e75e7d8cc268557cb6ba2669f9cd613a11e8574689b737430a4d47e9f7ce5a47d286ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    065b1cad8a305e50b4abd2eedbf1d555

    SHA1

    60b5f618f480b96e3488b4a960ede6f62ec96d16

    SHA256

    ffcd491ccb3b49da1bbcbb10823d082dea279d815ddb137f7ec1c5a8931bad9a

    SHA512

    bba3734bfc0e3ed06dd69231499a9ce7ac3b1c09a36ba5b5304eb4b00ad36b3a12e99884aa8ee950f0f1e9da9b866d642df5df08bbc2cbab2ead4011d38ac310

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    479a4bd95ecc5bfd5810d34fd8cbbb41

    SHA1

    cd963ef40f31b6b34ed43edbcdfadbd6cdd9eaf7

    SHA256

    360d3210f798ee570bf574c4beaf8b47c9e95579e58a0b7a953ce43be56418f1

    SHA512

    1656261dd4c41b35e03e7cfa66df09622a00f2ffa074aa32ae07c89829a3f70d2442fe64ebba7537d8c209281983762004de5d1f97f83e84874934ca202216f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1af1d07a902fc8df03ef5267a288e364

    SHA1

    05add7631863bce862e077efdf8a702b60e49252

    SHA256

    9cd4e361f31b7bcdd396251010899019d1ea57385d8d13dcc6d192581b09ae71

    SHA512

    8c479cb20630298fd90ff3ca58ffaddca1e8201adcff5a15fc4278400a84a11c2e9ab9faa4f79d156c4e2d38ae142e449fff8acca575ac104a29d853133d9bac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b89b26c9572a8a84887eb4c34c4405c

    SHA1

    63fa642a76bd9b5c4eb4b4e4a0b224a7bb946db0

    SHA256

    88dd543b0dbd26cc219492fd0948d47dbbfb38c18f47f10024733089e2fa2a18

    SHA512

    a76d8de56f548214f236d4eeb3211992c1a163b1f3423a40eeb9004de4185c1a2eed7334ae635749323916ade8b02113eaccc140f1d10405c774f9731f5f8a5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94072971600e49ef29cf280b3650692f

    SHA1

    94eb7ed542d5e6f2cfaa4941690702e0bd2f4420

    SHA256

    0227249a931898545a367053d010e7d3937a48c4994efeb910e328ef0214291b

    SHA512

    ccd29864e6552623a53a744a73942ac37b40f9faa12e205a5d6350c6f3b7c456ff8d593decf44d9bff9392d2ae3cca82aaa58695a12659cea30406a060f40577

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fe8023238432398117aac0883172046

    SHA1

    84790b5d934253e93518d58cab11a7d886e39bc6

    SHA256

    1cb08f6a0b0c29550e9e5bcc77cf832d4de45e66170bbf1af0e624e359febc1f

    SHA512

    8e743c96830136b6943e02b485d75854d982e6884a31ba3baf0b307c8a5a69350fa6ca9a730b4398848ec16b296aeb8b1cbf046de9dadf11b861f12709bf2b24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6ebf919dce1f67ec1dcc0b07028a0e1

    SHA1

    d34b5d090dfb3350fa2409b701ced9e46bc85052

    SHA256

    fe968a4d5876ea7b58bfb27cc3420d843b122d500544b512eda50193d02d4200

    SHA512

    4ef0e45553110d4a3e00f3bfb10687d12ae30678ee734c3198c2e9e7c5f1c9de3a50d268ca45f5d0c721ddf0486f94b0b74e2954a115a9fa1c906dcd59932913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6b52ae88e3bccc0760f2060b9c3ae38

    SHA1

    3f9128eccfaf4117d59fc01a443837d88c772dff

    SHA256

    3296e99ace8c8b154e387db8a5a7d718b835f77fd2885d4aa7fb4e9369f77c7e

    SHA512

    08b454f9b63251ec3e1d522f745a61b3c450a142f78852934c25997db9fc87363c7dbb74b73e1f04631546e3087a33d0c4b1c9ac6d760d37ee87d7777b76089d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dd6778f6c7e66d1a8ddc59e351d785f

    SHA1

    fcbc7481fcecacfbf5e316dece29624a8dd5400b

    SHA256

    cf0c2dd353283365de9253400236172e26535739f13ac65f21b1a39a9409cbb9

    SHA512

    545be4a6541a678ad73aafcda5cec5ccc8b8497bc97c54ecb6d223dd3dbef7364c50bf8fc702a1df4c5b3937c3ade3cf0447a0cc8c2088be39f239d4cba63c6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    668ddf035593f3df3857f562abca627e

    SHA1

    dfa848d64750c1eab9ae2da12396c91008554c3e

    SHA256

    40bbc0745c76360a7e9a7b9fd35cb2029c264c9f96fdb33527dda938e04b361e

    SHA512

    906e7ad270d678324c6dfc0f63aaeea0bd8c1e753816b92af52953d75e655dfe875c6057bb7933e043fe2a31bc95d1726022bc6d808d8236fcc529b2e3cb9640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    495d13892ebc93317b66b4aaf85cf215

    SHA1

    cb5647557c6ef935b3e6714404740e83742a0f39

    SHA256

    ccbcb55f8da23cc6c51e240414ccd10b21a4cd3e629700100b7b41542ce82f43

    SHA512

    f4a00608c8a4edbffd7e6fac613eb2cd34585e8f42541c9abea9f372d01bee5b942d836a1909454229d19ef26b86e6398eccf018a4815c4747722e940e73232b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4c6336072b99459d60ec65b98479762

    SHA1

    9c49160f2f6c563ca8cd23db6ab9c427b38ccfcd

    SHA256

    a0e174ddf1a046f53069caedb89e1bc3856867aa2a66df9156179478a5799296

    SHA512

    acea1576fa553762c2e4f9101421a09c82e8463ff36dc630f7caa02a62cdeedd7de44d132d79bce2ae138b90734084eb11cf4ac3f618c68ea3076adc8946018f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ee33733226b025125fb70563cf2076

    SHA1

    a62ed60841ebdf07474931440d54adeaaf348cee

    SHA256

    c65801a7b876689088c546e3b8d70eb602abb8f876af67a4e5c99f006746a6ee

    SHA512

    cf4f5665be744c7e693076843b11b9974c78d3495d62410f1099448aeca6a51d332389c29493a74c82c1a163438b6ded8eaec1b127ecccb20c8aabe61a94e58a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66c34a78cd97efca9be8ffa8e7e36ffb

    SHA1

    25759deb61205e614534eb00d2afa78bf979e357

    SHA256

    2b65bb0c105b2b92164bc88a1a6ff33b00b0922fcb0c08319b156b5a289e906d

    SHA512

    8cb38968eba34892e29447d3d1ce19ac4a40113bbe2568a6c76cb245db09d317df1c8f50d8aaf632d6db99ff86d29808402e075dc9059c2fd1316dcdcadd79eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    056acc00b3aff11dff46442ca6b89286

    SHA1

    4c3cbf3616f911c60917e9ab7e6f87f046bd0011

    SHA256

    78fdb4a2c927fe96079a6ceda5e1af757c83a62d8dcb1dc3f6806a37c29e24c9

    SHA512

    f60f91f640a68fe199bf0d5fa3be28fdb06b564da1cbb892814eb4a81440b86e7715edfec6645959c22823d3f0db2fe608e6ae76ceeb1c68f27b3e9d01fc5bee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7b0c152f4ea5015b22f5fd37eab6830

    SHA1

    836a960698ab5bcbca8f6f342c108923260b7b76

    SHA256

    027c73e8cfdcf9bc8a044f60d043fbc393b17dc8db855adf800b9e3bd6858f26

    SHA512

    21289021aec60c79eb2d181ae468b11747945b7838b391cbebb16ecd23f4c58cf1ca137d848e3caceea10decbe35305b491e54b3d9c292fdcdb17ebb051eee6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f34537caf42d33e154852ccad1a7ffe9

    SHA1

    856f808df26f9ed8ddb598006e72f964612acf22

    SHA256

    b4dcab8c65a8cc80a1e41ec57d4f0ed37ac47d72270ec580bf518fa913856e82

    SHA512

    312f83e7b424fd4ec7e140d11dfafd09ea392263432588dd0398679885ea2c029da6d1b08f7678bc51dbbe8362b4f7b600261717637807c8038598b3f8c77723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7202396911aa6806616a7915071ca457

    SHA1

    ca33e480d52d658509a0b98c117c98eb0ae48d11

    SHA256

    c50bd042d20395425cd069d2bcda87b4b112f436eae8cf519335585ee0a5b7b1

    SHA512

    706d6ace86f134aaf16580eb2356e01e460291b222f22e2563e93de87886134025a7966a72e763c190d29c6e43be92c9a6fee3b2611f4e82a381921a4226b172

  • C:\Users\Admin\AppData\Local\Temp\CabD7A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE0A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.