Digital Forensics: Date and Time Analysis in Computer Systems

Windows Operating System Artifacts
You must verify the date and time settings for the
evidence.
Verify and alter EnCase Time Zone information when
necessary
Microsoft often stores in both local and GMT
(Greenwich Mean Time)
Time Zone effects MAC information
Modified
Accessed
Created
Adjusting for Time Zone Offsets
Determine which Control Set is the current one
Mount the system registry
This is a compound file so you will need to mount is and View
the File Structure from the Entries drop-down
System\NTRegistry\Select\Current
View as a 32-bit integer
This determines which control set is current
System Registry Keys
Win NT/2000 – C:\Winnt\System32\Config
XP/Server 2003-2008/Windows Vist/7
C:\Windows\System32\Config
Navigate to the System Key
Navigate to the System Control indicated in the previous
step
Navigate to
System\NTRegistry\ControlSet00?\Control\TimeZone
Information
Review information located there
There are Bias times, Daylight Bias and names etc.
ActiveTimeBias – current offset from GMT
If in a Daylight Savings time zone and ActiveTimeBias
= StandardBias then you are in Standard Time
If the ActiveTimeBias=DaylightBias the computer is
set for daylight saving time
StandardName indicates the time zone setting
YOU CAN USE ENSCRIPTS TO ACCOMLISH THIS AS
WELL
MUST COMPLETE BEFORE PROCESSING
Adjusting the Date and Time Zone
Evidence tab Entries view
Focus at top or Entries Level
Highlight the device
Modify Time Zone Settings from Device Drop-down menu
Select the correct time zone offset based on your earlier
analysis of the time zone settings for your device
Select OK
User can hold down the Shift key when pressing
Delete  to bypass the Recycle Bin (few users know this)
Detail of the Recycle Bin
User Deletes File
MFT for file is deleted
Directory entry or MFT entry made for the file in the Recycle
Bin
New filename has nothing to do with original file
D[original drive letter of file] [index number].[original file
extension]
D=deleted
INFO2 File
When a user views files in the Recycle Bin – stored as a
hidden file named INFO2
When a user deletes a file an entry is also in the INFO2 file
INFO2 – database for deleted files
Files Original filename and path (ASCII and Unicode)
Date and Time of deletion
Index number – link between new filename and INFO2 record
Records in the INFO2 database are a fixed length
Important because we can bookmark-viewing tool that can decode the
fields so you can include it in your report as a sweeping bookmark
Must know starting point and record length
Utilize the proper wrap length depending on OS (491 chart)
Decode tab allows for EnCase to report INFO2 information
When a user first deletes a file a folder with their SID is
created and whenever they delete a file it resides
within that folder
Mounting the SAM (Security Accounts Manager) –
registry file
EnCase scans the SAM when loading the evidence files
resolving SID to authenticated users
Highlight the SID folder in the recycle bin
Permissions view – NTFS permissions appear
Local logon accounts where the hosts SAM stores the
SID
SID for a Domain Logon
Stored on the Server
EnCase cannot resolve these because the SAM is not
local
You will need to obtain the username for the SID
manually in the Secure Storage View after that EnCase
will remember the SID and username combination and
resolve it for you
EnCase EDS module processes the cached domain
accounts with Analyze Encrypted Files System (EFS)
Get the volume to show in table view ->highlight it->Analyze
EFS from the Device drop-down menu
The cached info. Will be analyzed and available to the
examiner
Determining the Owner of Files in
Recycle Bin - 2
Emptying the Recycle Bin deletes the files in the FAT
or MFT and the INFO2 database. 
Checking the slack immediately after the 20-byte header
you will see much of the INFO2 records in the Recycle
Bin prior to it being emptied.
Restored Files
A record is created int eh MFT for the folder where the
file was originally locatd
Entry for the file in the MFT of the Recycle Bin is
marked deleted
Entry in INFO2 file – not deleted 1
st
 character 00h –
similar to E5h for deleted files
Restored or Deleted items 
INFO2 search for string 00 3A 5C
Looks for :\preceded by 00h 
You would then need to analyze the files further to see original
paths and MFT entries for filenames, starting clusters, and so forth
Windows Artifact Parser
Launch Evidence Processor
Modules at the bottom
Recycle Bin Files is one
Looking in unallocated clusters will add significant time
Run Case Analyzer from the EnSCript menu – provides you
with an interface where you can drill down and review various
artifacts recovered
Right Click the Recycle Bin ->Properties
Do Not Move Files to the Recycle Bin
Represented in the Registry
NukeOnDelete registry value to 01h
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
\CurrentVerson\Explorer\BitBucket
Once set when a file is deleted
Indicated by a lot of deleted files and not much info. In the
INFO2 record artifacts
Suspect it has been set
Verify via Registry
$Recycle.Bin
$I – Individual index files in the Recycle Bin
Full path begins at byte offset 24
Time stamp for deletion – immediately precedes the path
64bit Windows time stamp FO 16-23
Creation and Deleted time stamps (should match)
File size is also important FO 8-11 Dword value
Only parent folder is renamed everything else will not be
$R – Deleted filename starts with $R
Both have a GUID that matches
EnCase will show you the data with the filename before
it has been deleted. 
Short Name column will show you the raw filename
Updated Recycle Bin for Win 7
Identify files placed in the Recycle Bin from mapped
drives
.lnk files – Shortcuts
Applications, directories, documents or data fles
Printers etc
Changing the Properties of a Shortcut
Icon – right click icon ->properties ->shortcut tab
Forensic Importance
Properties, contents, and creation specifics
Creation
Created by the OS and by applications at install
Created by the User with or without their knowledge
Created in the Recent Folder
When a user opens a file
Users\UserName\AppData\Roaming\Microsoft\Windows\R
ecent
Contain MAC time stamps
May indicate a user was aware of a program and intentionally
created easy access to it
Content
Describes the various attributes of the target file
Complete Path
Vol. serial number on which the target exists
File’s size in bytes
MAC time stamps of target
Created, last accessed and last written (in that order)
FO 28, 36, 44
Select all three – starting at FO28 to FO52 - 24 bytes
Decode view – Choose dates under view types->Windows
Date/Time
All three will be shown in their respective order
Find a link file wherever they may exist
String \x4C\x00\x00\x00\x01\x14\x02
o
Located within the EnCase Evidence Processor
o
Modules
o
Windows Artifact Parser
o
Select this option when running the Evidence Processor
o
This will add time to the process
o
Once the processor completes run Case Analyzer
o
This parses information found and presents it to you in a
hierarchical navigation
o
You should parse unallocated space as well as link files may
often be stored in swap files etc.
o
Hibernation file holds much info as well. Hiberfil.sys
o
Examiners should be familiar with directory and
naming conventions for various Windows OS
o
System File Locations
[Instructor Selected Image]
o
Windows creates a unique folder when a user logs on
for the first time. 
o
A folder is created that bears the name of the user
o
Created if a user logs on locally or through a domain
o
Reparse Points
o
Microsoft's way of maintaining backward compatibility while
changing names and locations of folders
o
Windows segregates user's configurations,
environment and document files into sub-folders
under the root user folder.
o
NTUSER.DAT is also created at first log-on
o
It is comprised of the user's registry hive
o
Specific to that user ONLY
o
File Creation date would indicate the first time the user logged
on
o
Last Written date – user last logged out / used the computer
o
Recent Folder
o
Provides a user interface that lists documents the user has
recently created or modified
o
There is a link file created in order to access this information.
o
C:\Users\%UserName%\AppData\Roaming\Microsoft\Windo
ws\Recent
o
Users are unaware of this link file creation
o
Contains only link files
o
This folder can contain hundreds of link files even though
Windows displays only the 15 most recently used.
o
One link file per document – the link file is updated every time
it is accessed.
Desktop Folder
o
Usually shortcuts (link files), applications or documents
o
Contents of the Desktop come from 3 locations:
o
Registry 
o
All Users/Desktop or Public/Desktop
o
User's Desktop Folder
o
My Documents/Documents
o
Purpose of folder
o
Segregated storage of data
o
Send To Folder
o
Objects or links that will appear in the Explorer interface
o
Good spot to find attached media (.zip, usb, etc)
o
Temp Folder – sub-folder of the Local Settings
o
Users\%UserName%\AppData\Local\Temp
o
Many files can be found here – used by many applications
o
Normally a “hidden” folder
o
Favorites Folder
o
Internet shortcut files for Microsoft Internet Explorer
o
.url files
o
Besides vendor manipulated OS shortcuts and those default to
the browser the items here can generally be explained to be
placed by the user
o
Multiple favorites with the same time-stamp may indicate
malicious software
o
Windows Vista Low Folders
o
Cookies, History and Temporary Internet Files
o
Low folders are created for security
o
Windows places items here so they will have the lowest possible
level of integrity and is in a “protective” shell
o
Maneuvering around in the Windows Explorer shell items from
opening documents will also make it into this area therefore
not everything is located in Low
o
Windows Vista Low Folders
o
Differences can lie in these exceptions:
o
Disabling Internet Explorer 9 protected mode
o
Running IE9 in Administrator mode
o
Turning off the UAC
o
Trusted sites are considered “safe” the protected mode does not
apply to those sites
o
Viewing local HTML files
o
Cookies Folder
o
\Users\%UserName%\AppData\Roaming\Microsoft\Windows
\Cookies
o
Includes a Low folder as well
o
Pieces of code placed on a users computer to enhance a user's
browsing experience
o
.txt file extentions
o
Index.dat file keeps track of them all
o
Pointers to the cookie file and the originating web domain name
o
Dates 
o
Could be used to check cookie expiration date with system time
o
CookieView is included in EnCase as a viewer
o
You can open the cookie with the viewer 
o
History folder
o
Local folder – because it does NOT follow a user in a domain
setting
o
C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Hi
story
o
History of Internet Browsing
o
Must parse Internet History in Evidence Processor in order for
EnCase to decode them for your viewing
o
Once parsed they are located
o
IE history and web cache – results in the Records tab
o
Case Analyzer can also be used to summarize info.
o
Temporary Internet Files
o
Local Settings – does NOT follow a user on the domain
o
C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Te
mporary Internet Files
o
Low folders are here as well
o
Stores files downloaded and cached from the Internet
o
Index.dat file
o
Swap File
o
Pagefile – area where information is written when RAM is
maxed
o
Should always check this file
o
Registry Key
o
Key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Con
trol\Session Manager\Memory Management
o
A setting of ClearPageFileAtShutdown with a value of 1 indicates
the page file is to be deleted at shutdown
o
Hibernation File
o
Hiberfil.sys
o
Holds the entire RAM
o
Print Spooling
o
Writing the print job to a couple of files so the print job can run
in the background
o
Winnt\system32\spool\printers
o
Windows\system32\spool\printers
o
Can be configured by the user
o
Key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wondows\NT\C
urrentVersion\Print\Printers\DefaultSpoolDirectory
o
Could be sen to the server in a networked environment
o
Print Spool
o
2 files
o
Shadow file .shd extension
o
Username, printer, name of file and print mode
o
Spool file .spl extension
o
Actual print job graphical data
o
Matching 5 digit names
o
Default printing mode is EMF – Microsoft Enhanced Metafile
o
Each page printed will be represented by an EMF file embedded
within the spool file in the order they were printed
o
Has it's own unique header
o
Usually located in slack space
This workforce product was funded by a grant awarded by the U.S. Department of Labor’s Employment and Training
Administration. The product was created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied,
with respect to such information, including any information on linked sites, and including, but not limited to accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership.
Except where otherwise noted, this work by Central Maine Community College is licensed under the 
Creative Commons
Attribution 4.0 International License
.
Slide Note
Embed
Share

Conducting date and time analysis in computer forensics is essential to verify evidence accuracy. Tasks include adjusting time zone offsets, accessing registry keys, and adjusting zone settings for data integrity. Understanding timestamps aids in investigations for legal purposes.

  • Digital Forensics
  • Time Analysis
  • Computer Systems
  • Date Verification
  • Registry Keys

Uploaded on Oct 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. EnCase Computer Forensics Windows Operating System Artifacts

  2. Dates and Times - 1 You must verify the date and time settings for the evidence. Verify and alter EnCase Time Zone information when necessary Microsoft often stores in both local and GMT (Greenwich Mean Time) Time Zone effects MAC information Modified Accessed Created

  3. Dates and Times - 2 Adjusting for Time Zone Offsets Determine which Control Set is the current one Mount the system registry This is a compound file so you will need to mount is and View the File Structure from the Entries drop-down System\NTRegistry\Select\Current View as a 32-bit integer This determines which control set is current System Registry Keys Win NT/2000 C:\Winnt\System32\Config XP/Server 2003-2008/Windows Vist/7 C:\Windows\System32\Config

  4. Date and Time - 3 Navigate to the System Key Navigate to the System Control indicated in the previous step Navigate to System\NTRegistry\ControlSet00?\Control\TimeZone Information Review information located there There are Bias times, Daylight Bias and names etc.

  5. Dates and Times - 4 ActiveTimeBias current offset from GMT If in a Daylight Savings time zone and ActiveTimeBias = StandardBias then you are in Standard Time If the ActiveTimeBias=DaylightBias the computer is set for daylight saving time StandardName indicates the time zone setting YOU CAN USE ENSCRIPTS TO ACCOMLISH THIS AS WELL MUST COMPLETE BEFORE PROCESSING

  6. Date and Time - 5 Adjusting the Date and Time Zone Evidence tab Entries view Focus at top or Entries Level Highlight the device Modify Time Zone Settings from Device Drop-down menu Select the correct time zone offset based on your earlier analysis of the time zone settings for your device Select OK

  7. Recycle Bin - 1 User can hold down the Shift key when pressing Delete to bypass the Recycle Bin (few users know this) Detail of the Recycle Bin User Deletes File MFT for file is deleted Directory entry or MFT entry made for the file in the Recycle Bin New filename has nothing to do with original file D[original drive letter of file] [index number].[original file extension] D=deleted

  8. Recycle Bin - 2 INFO2 File When a user views files in the Recycle Bin stored as a hidden file named INFO2 When a user deletes a file an entry is also in the INFO2 file INFO2 database for deleted files Files Original filename and path (ASCII and Unicode) Date and Time of deletion Index number link between new filename and INFO2 record Records in the INFO2 database are a fixed length Important because we can bookmark-viewing tool that can decode the fields so you can include it in your report as a sweeping bookmark Must know starting point and record length Utilize the proper wrap length depending on OS (491 chart) Decode tab allows for EnCase to report INFO2 information

  9. Determining the Owner of Files in Recycle Bin - 1 When a user first deletes a file a folder with their SID is created and whenever they delete a file it resides within that folder Mounting the SAM (Security Accounts Manager) registry file EnCase scans the SAM when loading the evidence files resolving SID to authenticated users Highlight the SID folder in the recycle bin Permissions view NTFS permissions appear Local logon accounts where the hosts SAM stores the SID

  10. Determining the Owner of Files in Recycle Bin - 2 SID for a Domain Logon Stored on the Server EnCase cannot resolve these because the SAM is not local You will need to obtain the username for the SID manually in the Secure Storage View after that EnCase will remember the SID and username combination and resolve it for you EnCase EDS module processes the cached domain accounts with Analyze Encrypted Files System (EFS) Get the volume to show in table view ->highlight it->Analyze EFS from the Device drop-down menu The cached info. Will be analyzed and available to the examiner

  11. Files Restored or Deleted from the Recycle Bin Emptying the Recycle Bin deletes the files in the FAT or MFT and the INFO2 database. Checking the slack immediately after the 20-byte header you will see much of the INFO2 records in the Recycle Bin prior to it being emptied. Restored Files A record is created int eh MFT for the folder where the file was originally locatd Entry for the file in the MFT of the Recycle Bin is marked deleted Entry in INFO2 file not deleted 1stcharacter 00h similar to E5h for deleted files

  12. Evidence Processor to Determine Status of Recycle Bin Items Restored or Deleted items INFO2 search for string 00 3A 5C Looks for :\preceded by 00h You would then need to analyze the files further to see original paths and MFT entries for filenames, starting clusters, and so forth Windows Artifact Parser Launch Evidence Processor Modules at the bottom Recycle Bin Files is one Looking in unallocated clusters will add significant time Run Case Analyzer from the EnSCript menu provides you with an interface where you can drill down and review various artifacts recovered

  13. Recycle Bin Bypass Right Click the Recycle Bin ->Properties Do Not Move Files to the Recycle Bin Represented in the Registry NukeOnDelete registry value to 01h HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVerson\Explorer\BitBucket Once set when a file is deleted Indicated by a lot of deleted files and not much info. In the INFO2 record artifacts Suspect it has been set Verify via Registry

  14. Windows Vista/7 Recycle Bin -1 $Recycle.Bin $I Individual index files in the Recycle Bin Full path begins at byte offset 24 Time stamp for deletion immediately precedes the path 64bit Windows time stamp FO 16-23 Creation and Deleted time stamps (should match) File size is also important FO 8-11 Dword value Only parent folder is renamed everything else will not be $R Deleted filename starts with $R Both have a GUID that matches EnCase will show you the data with the filename before it has been deleted. Short Name column will show you the raw filename

  15. Windows Vista/7 Recycle Bin - 2 Updated Recycle Bin for Win 7 Identify files placed in the Recycle Bin from mapped drives

  16. Link Files -1 .lnk files Shortcuts Applications, directories, documents or data fles Printers etc Changing the Properties of a Shortcut Icon right click icon ->properties ->shortcut tab Forensic Importance Properties, contents, and creation specifics Creation Created by the OS and by applications at install Created by the User with or without their knowledge

  17. Link Files - 2 Created in the Recent Folder When a user opens a file Users\UserName\AppData\Roaming\Microsoft\Windows\R ecent Contain MAC time stamps May indicate a user was aware of a program and intentionally created easy access to it

  18. Link Files - 3 Content Describes the various attributes of the target file Complete Path Vol. serial number on which the target exists File s size in bytes MAC time stamps of target Created, last accessed and last written (in that order) FO 28, 36, 44 Select all three starting at FO28 to FO52 - 24 bytes Decode view Choose dates under view types->Windows Date/Time All three will be shown in their respective order Find a link file wherever they may exist String \x4C\x00\x00\x00\x01\x14\x02

  19. Link File Parser Located within the EnCase Evidence Processor o Modules o Windows Artifact Parser o Select this option when running the Evidence Processor This will add time to the process o Once the processor completes run Case Analyzer This parses information found and presents it to you in a hierarchical navigation o You should parse unallocated space as well as link files may often be stored in swap files etc. o Hibernation file holds much info as well. Hiberfil.sys o o o

  20. Windows Folders - 1 Examiners should be familiar with directory and naming conventions for various Windows OS o System File Locations [Instructor Selected Image] o

  21. Windows Folders - 2 Windows creates a unique folder when a user logs on for the first time. o A folder is created that bears the name of the user o Created if a user logs on locally or through a domain Reparse Points o Microsoft's way of maintaining backward compatibility while changing names and locations of folders Windows segregates user's configurations, environment and document files into sub-folders under the root user folder. o o o

  22. Windows Folders - 3 NTUSER.DAT is also created at first log-on o It is comprised of the user's registry hive o Specific to that user ONLY o File Creation date would indicate the first time the user logged on o Last Written date user last logged out / used the computer o

  23. Windows Folders - 4 Recent Folder o Provides a user interface that lists documents the user has recently created or modified o There is a link file created in order to access this information. o C:\Users\%UserName%\AppData\Roaming\Microsoft\Windo ws\Recent Users are unaware of this link file creation o Contains only link files o This folder can contain hundreds of link files even though Windows displays only the 15 most recently used. o One link file per document the link file is updated every time it is accessed. o o

  24. Windows Folders - 5 Desktop Folder o Usually shortcuts (link files), applications or documents o Contents of the Desktop come from 3 locations: Registry All Users/Desktop or Public/Desktop User's Desktop Folder o o o

  25. Windows Folders - 6 My Documents/Documents o Purpose of folder Segregated storage of data Send To Folder o Objects or links that will appear in the Explorer interface Good spot to find attached media (.zip, usb, etc) Temp Folder sub-folder of the Local Settings o Users\%UserName%\AppData\Local\Temp o Many files can be found here used by many applications o Normally a hidden folder o o o o o

  26. Windows Folders - 7 Favorites Folder o Internet shortcut files for Microsoft Internet Explorer o .url files o Besides vendor manipulated OS shortcuts and those default to the browser the items here can generally be explained to be placed by the user o Multiple favorites with the same time-stamp may indicate malicious software o

  27. Windows Folders - 8 Windows Vista Low Folders o Cookies, History and Temporary Internet Files Low folders are created for security Windows places items here so they will have the lowest possible level of integrity and is in a protective shell o Maneuvering around in the Windows Explorer shell items from opening documents will also make it into this area therefore not everything is located in Low o o o

  28. Windows Folders - 9 Windows Vista Low Folders o Differences can lie in these exceptions: Disabling Internet Explorer 9 protected mode Running IE9 in Administrator mode Turning off the UAC Trusted sites are considered safe the protected mode does not apply to those sites Viewing local HTML files o o o o o o

  29. Windows Folders - 10 Cookies Folder o \Users\%UserName%\AppData\Roaming\Microsoft\Windows \Cookies Includes a Low folder as well o Pieces of code placed on a users computer to enhance a user's browsing experience o .txt file extentions o Index.dat file keeps track of them all Pointers to the cookie file and the originating web domain name Dates o Could be used to check cookie expiration date with system time o CookieView is included in EnCase as a viewer o You can open the cookie with the viewer o o o o

  30. Windows Folders - 11 History folder o Local folder because it does NOT follow a user in a domain setting C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Hi story History of Internet Browsing o Must parse Internet History in Evidence Processor in order for EnCase to decode them for your viewing o Once parsed they are located IE history and web cache results in the Records tab Case Analyzer can also be used to summarize info. o o o o o

  31. Windows Folders - 12 Temporary Internet Files o Local Settings does NOT follow a user on the domain C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Te mporary Internet Files o Low folders are here as well Stores files downloaded and cached from the Internet o Index.dat file o o o

  32. Windows Folders - 13 Swap File o Pagefile area where information is written when RAM is maxed o Should always check this file o Registry Key Key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Con trol\Session Manager\Memory Management A setting of ClearPageFileAtShutdown with a value of 1 indicates the page file is to be deleted at shutdown o o o

  33. Windows Folders - 14 Hibernation File o Hiberfil.sys o Holds the entire RAM Print Spooling o Writing the print job to a couple of files so the print job can run in the background Winnt\system32\spool\printers Windows\system32\spool\printers Can be configured by the user o Key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wondows\NT\C urrentVersion\Print\Printers\DefaultSpoolDirectory o Could be sen to the server in a networked environment o o o o o

  34. Windows Folders - 15 Print Spool o 2 files o Shadow file .shd extension o Username, printer, name of file and print mode Spool file .spl extension o Actual print job graphical data Matching 5 digit names Default printing mode is EMF Microsoft Enhanced Metafile Each page printed will be represented by an EMF file embedded within the spool file in the order they were printed Has it's own unique header Usually located in slack space o o o o o o o

  35. DOL Disclaimer and CCBY This workforce product was funded by a grant awarded by the U.S. Department of Labor s Employment and Training Administration. The product was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites, and including, but not limited to accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Creative Commons License Except where otherwise noted, this work by Central Maine Community College is licensed under the Creative Commons Attribution 4.0 International License.

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#