VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Dropper
Backdoor
Spyware
|
Threat Names: |
Quasar
Gen:Variant.Bulz.92263
Trojan.GenericKD.34635518
...
|
FallGuysStats.exe
Windows Exe (x86-32)
Created at 2020-10-05T07:40:00
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 minute, 40 seconds" to "10 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\FallGuysStats.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x62020e |
Size Of Code | 0x21e400 |
Size Of Initialized Data | 0x4c00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-10-04 19:58:54+00:00 |
Version Information (11)
»
Assembly Version | 1.77.0.0 |
Comments | - |
CompanyName | - |
FileDescription | FallGuysStats |
FileVersion | 1.77.0.0 |
InternalName | FallGuysStats.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | FallGuysStats.exe |
ProductName | FallGuysStats |
ProductVersion | 1.77.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x21e214 | 0x21e400 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.95 |
.rsrc | 0x622000 | 0x4868 | 0x4a00 | 0x21e600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.49 |
.reloc | 0x628000 | 0xc | 0x200 | 0x223000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x2201e4 | 0x21e3e4 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
fallguysstats.exe | 1 | 0x012E0000 | 0x01509FFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
fallguysstats.exe | 1 | 0x012E0000 | 0x01509FFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\keys.util | Dropped File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x48ecee |
Size Of Code | 0x8ce00 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2104-04-11 18:36:52+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | Ninja Project |
FileVersion | 1.0.0.0 |
InternalName | Ninja Project.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | Ninja Project.exe |
ProductName | Ninja Project |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x8ccf4 | 0x8ce00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.67 |
.rsrc | 0x490000 | 0x5cc | 0x600 | 0x8d000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.12 |
.reloc | 0x492000 | 0xc | 0x200 | 0x8d600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x8ecc1 | 0x8cec1 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Bulz.92263 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\Microsoft\ctfmom.exe | Dropped File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40dc87 |
Size Of Code | 0x28400 |
Size Of Initialized Data | 0x13e00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-09-26 12:52:07+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x282d4 | 0x28400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.65 |
.rdata | 0x42a000 | 0xf384 | 0xf400 | 0x28800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.38 |
.data | 0x43a000 | 0x1f78 | 0x1200 | 0x37c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.22 |
.rsrc | 0x43c000 | 0x1e0 | 0x200 | 0x38e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.72 |
.reloc | 0x43d000 | 0x2618 | 0x2800 | 0x39000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.45 |
Imports (3)
»
KERNEL32.dll (89)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleW | 0x0 | 0x42a018 | 0x38a98 | 0x37298 | 0x278 |
GlobalUnlock | 0x0 | 0x42a01c | 0x38a9c | 0x3729c | 0x33f |
WriteConsoleW | 0x0 | 0x42a020 | 0x38aa0 | 0x372a0 | 0x611 |
HeapSize | 0x0 | 0x42a024 | 0x38aa4 | 0x372a4 | 0x34e |
GlobalLock | 0x0 | 0x42a028 | 0x38aa8 | 0x372a8 | 0x338 |
GetProcessHeap | 0x0 | 0x42a02c | 0x38aac | 0x372ac | 0x2b4 |
SetEnvironmentVariableW | 0x0 | 0x42a030 | 0x38ab0 | 0x372b0 | 0x514 |
FreeEnvironmentStringsW | 0x0 | 0x42a034 | 0x38ab4 | 0x372b4 | 0x1aa |
GetEnvironmentStringsW | 0x0 | 0x42a038 | 0x38ab8 | 0x372b8 | 0x237 |
GetCommandLineW | 0x0 | 0x42a03c | 0x38abc | 0x372bc | 0x1d7 |
GlobalAlloc | 0x0 | 0x42a040 | 0x38ac0 | 0x372c0 | 0x32d |
CopyFileA | 0x0 | 0x42a044 | 0x38ac4 | 0x372c4 | 0xa8 |
Sleep | 0x0 | 0x42a048 | 0x38ac8 | 0x372c8 | 0x57d |
MultiByteToWideChar | 0x0 | 0x42a04c | 0x38acc | 0x372cc | 0x3ef |
GetModuleFileNameA | 0x0 | 0x42a050 | 0x38ad0 | 0x372d0 | 0x273 |
GetLastError | 0x0 | 0x42a054 | 0x38ad4 | 0x372d4 | 0x261 |
WideCharToMultiByte | 0x0 | 0x42a058 | 0x38ad8 | 0x372d8 | 0x5fe |
EnterCriticalSection | 0x0 | 0x42a05c | 0x38adc | 0x372dc | 0x131 |
LeaveCriticalSection | 0x0 | 0x42a060 | 0x38ae0 | 0x372e0 | 0x3bd |
DeleteCriticalSection | 0x0 | 0x42a064 | 0x38ae4 | 0x372e4 | 0x110 |
SetLastError | 0x0 | 0x42a068 | 0x38ae8 | 0x372e8 | 0x532 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x42a06c | 0x38aec | 0x372ec | 0x35f |
SwitchToThread | 0x0 | 0x42a070 | 0x38af0 | 0x372f0 | 0x587 |
TlsAlloc | 0x0 | 0x42a074 | 0x38af4 | 0x372f4 | 0x59e |
TlsGetValue | 0x0 | 0x42a078 | 0x38af8 | 0x372f8 | 0x5a0 |
TlsSetValue | 0x0 | 0x42a07c | 0x38afc | 0x372fc | 0x5a1 |
TlsFree | 0x0 | 0x42a080 | 0x38b00 | 0x37300 | 0x59f |
GetSystemTimeAsFileTime | 0x0 | 0x42a084 | 0x38b04 | 0x37304 | 0x2e9 |
GetProcAddress | 0x0 | 0x42a088 | 0x38b08 | 0x37308 | 0x2ae |
EncodePointer | 0x0 | 0x42a08c | 0x38b0c | 0x3730c | 0x12d |
DecodePointer | 0x0 | 0x42a090 | 0x38b10 | 0x37310 | 0x109 |
GetCPInfo | 0x0 | 0x42a094 | 0x38b14 | 0x37314 | 0x1c1 |
CompareStringW | 0x0 | 0x42a098 | 0x38b18 | 0x37318 | 0x9b |
LCMapStringW | 0x0 | 0x42a09c | 0x38b1c | 0x3731c | 0x3b1 |
GetLocaleInfoW | 0x0 | 0x42a0a0 | 0x38b20 | 0x37320 | 0x265 |
GetStringTypeW | 0x0 | 0x42a0a4 | 0x38b24 | 0x37324 | 0x2d7 |
UnhandledExceptionFilter | 0x0 | 0x42a0a8 | 0x38b28 | 0x37328 | 0x5ad |
SetUnhandledExceptionFilter | 0x0 | 0x42a0ac | 0x38b2c | 0x3732c | 0x56d |
GetCurrentProcess | 0x0 | 0x42a0b0 | 0x38b30 | 0x37330 | 0x217 |
TerminateProcess | 0x0 | 0x42a0b4 | 0x38b34 | 0x37334 | 0x58c |
IsProcessorFeaturePresent | 0x0 | 0x42a0b8 | 0x38b38 | 0x37338 | 0x386 |
IsDebuggerPresent | 0x0 | 0x42a0bc | 0x38b3c | 0x3733c | 0x37f |
GetStartupInfoW | 0x0 | 0x42a0c0 | 0x38b40 | 0x37340 | 0x2d0 |
QueryPerformanceCounter | 0x0 | 0x42a0c4 | 0x38b44 | 0x37344 | 0x44d |
GetCurrentProcessId | 0x0 | 0x42a0c8 | 0x38b48 | 0x37348 | 0x218 |
GetCurrentThreadId | 0x0 | 0x42a0cc | 0x38b4c | 0x3734c | 0x21c |
InitializeSListHead | 0x0 | 0x42a0d0 | 0x38b50 | 0x37350 | 0x363 |
RtlUnwind | 0x0 | 0x42a0d4 | 0x38b54 | 0x37354 | 0x4d3 |
RaiseException | 0x0 | 0x42a0d8 | 0x38b58 | 0x37358 | 0x462 |
FreeLibrary | 0x0 | 0x42a0dc | 0x38b5c | 0x3735c | 0x1ab |
LoadLibraryExW | 0x0 | 0x42a0e0 | 0x38b60 | 0x37360 | 0x3c3 |
ExitProcess | 0x0 | 0x42a0e4 | 0x38b64 | 0x37364 | 0x15e |
GetModuleHandleExW | 0x0 | 0x42a0e8 | 0x38b68 | 0x37368 | 0x277 |
CreateFileW | 0x0 | 0x42a0ec | 0x38b6c | 0x3736c | 0xcb |
GetDriveTypeW | 0x0 | 0x42a0f0 | 0x38b70 | 0x37370 | 0x22f |
GetFileInformationByHandle | 0x0 | 0x42a0f4 | 0x38b74 | 0x37374 | 0x247 |
GetFileType | 0x0 | 0x42a0f8 | 0x38b78 | 0x37378 | 0x24e |
CloseHandle | 0x0 | 0x42a0fc | 0x38b7c | 0x3737c | 0x86 |
PeekNamedPipe | 0x0 | 0x42a100 | 0x38b80 | 0x37380 | 0x422 |
SystemTimeToTzSpecificLocalTime | 0x0 | 0x42a104 | 0x38b84 | 0x37384 | 0x589 |
FileTimeToSystemTime | 0x0 | 0x42a108 | 0x38b88 | 0x37388 | 0x16a |
GetModuleFileNameW | 0x0 | 0x42a10c | 0x38b8c | 0x3738c | 0x274 |
GetStdHandle | 0x0 | 0x42a110 | 0x38b90 | 0x37390 | 0x2d2 |
WriteFile | 0x0 | 0x42a114 | 0x38b94 | 0x37394 | 0x612 |
GetFileSizeEx | 0x0 | 0x42a118 | 0x38b98 | 0x37398 | 0x24c |
SetFilePointerEx | 0x0 | 0x42a11c | 0x38b9c | 0x3739c | 0x523 |
HeapAlloc | 0x0 | 0x42a120 | 0x38ba0 | 0x373a0 | 0x345 |
FlushFileBuffers | 0x0 | 0x42a124 | 0x38ba4 | 0x373a4 | 0x19f |
GetConsoleCP | 0x0 | 0x42a128 | 0x38ba8 | 0x373a8 | 0x1ea |
GetConsoleMode | 0x0 | 0x42a12c | 0x38bac | 0x373ac | 0x1fc |
HeapFree | 0x0 | 0x42a130 | 0x38bb0 | 0x373b0 | 0x349 |
HeapReAlloc | 0x0 | 0x42a134 | 0x38bb4 | 0x373b4 | 0x34c |
GetCurrentDirectoryW | 0x0 | 0x42a138 | 0x38bb8 | 0x373b8 | 0x211 |
GetFullPathNameW | 0x0 | 0x42a13c | 0x38bbc | 0x373bc | 0x259 |
IsValidLocale | 0x0 | 0x42a140 | 0x38bc0 | 0x373c0 | 0x38d |
GetUserDefaultLCID | 0x0 | 0x42a144 | 0x38bc4 | 0x373c4 | 0x312 |
EnumSystemLocalesW | 0x0 | 0x42a148 | 0x38bc8 | 0x373c8 | 0x154 |
SetStdHandle | 0x0 | 0x42a14c | 0x38bcc | 0x373cc | 0x54a |
ReadFile | 0x0 | 0x42a150 | 0x38bd0 | 0x373d0 | 0x473 |
ReadConsoleW | 0x0 | 0x42a154 | 0x38bd4 | 0x373d4 | 0x470 |
GetTimeZoneInformation | 0x0 | 0x42a158 | 0x38bd8 | 0x373d8 | 0x30e |
FindClose | 0x0 | 0x42a15c | 0x38bdc | 0x373dc | 0x175 |
FindFirstFileExW | 0x0 | 0x42a160 | 0x38be0 | 0x373e0 | 0x17b |
FindNextFileW | 0x0 | 0x42a164 | 0x38be4 | 0x373e4 | 0x18c |
IsValidCodePage | 0x0 | 0x42a168 | 0x38be8 | 0x373e8 | 0x38b |
GetACP | 0x0 | 0x42a16c | 0x38bec | 0x373ec | 0x1b2 |
GetOEMCP | 0x0 | 0x42a170 | 0x38bf0 | 0x373f0 | 0x297 |
GetCommandLineA | 0x0 | 0x42a174 | 0x38bf4 | 0x373f4 | 0x1d6 |
SetEndOfFile | 0x0 | 0x42a178 | 0x38bf8 | 0x373f8 | 0x510 |
USER32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EmptyClipboard | 0x0 | 0x42a180 | 0x38c00 | 0x37400 | 0xe8 |
GetClipboardData | 0x0 | 0x42a184 | 0x38c04 | 0x37404 | 0x134 |
SetClipboardData | 0x0 | 0x42a188 | 0x38c08 | 0x37408 | 0x31b |
IsClipboardFormatAvailable | 0x0 | 0x42a18c | 0x38c0c | 0x3740c | 0x228 |
CloseClipboard | 0x0 | 0x42a190 | 0x38c10 | 0x37410 | 0x4f |
OpenClipboard | 0x0 | 0x42a194 | 0x38c14 | 0x37414 | 0x297 |
ADVAPI32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegOpenKeyA | 0x0 | 0x42a000 | 0x38a80 | 0x37280 | 0x28a |
RegQueryValueExA | 0x0 | 0x42a004 | 0x38a84 | 0x37284 | 0x298 |
RegSetValueExA | 0x0 | 0x42a008 | 0x38a88 | 0x37288 | 0x2a8 |
RegOpenKeyExA | 0x0 | 0x42a00c | 0x38a8c | 0x3728c | 0x28b |
RegCloseKey | 0x0 | 0x42a010 | 0x38a90 | 0x37290 | 0x25b |
Memory Dumps (3)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
ctfmom.exe | 4 | 0x00900000 | 0x0093FFFF | Relevant Image |
![]() |
32-bit | 0x009271F5 |
![]() |
![]() |
...
|
ctfmom.exe | 21 | 0x008E0000 | 0x0091FFFF | Relevant Image |
![]() |
32-bit | 0x009071F5 |
![]() |
![]() |
...
|
ctfmom.exe | 21 | 0x008E0000 | 0x0091FFFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.34635518 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\gpustats.bx | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\9df274b54410817b3690312b4cb55431\ec3947efc19179a8010c6bae37caac89\Dirs\Temp.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\gpustats.bx | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\Microsoft\_CL_02f3a8c9sy | Dropped File | Text |
Unknown
|
...
|
»
Dirs\Desktop.txt | Embedded File | Text |
Unknown
|
...
|
»
Dirs\Documents.txt | Embedded File | Text |
Unknown
|
...
|
»
Dirs\Pictures.txt | Embedded File | Text |
Unknown
|
...
|
»
Dirs\Startup.txt | Embedded File | Text |
Unknown
|
...
|
»
Dirs\Downloads.txt | Embedded File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\ran.bx | Dropped File | Text |
Unknown
|
...
|
»
DBs\Google\Login Data | Embedded File | Sqlite |
Unknown
|
...
|
»
DBs\Google\Cookies | Embedded File | Sqlite |
Unknown
|
...
|
»
DBs\Google\Local State | Embedded File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\tempDataBase2020-10-05T18_43_56.1430000+11_0088 | Dropped File | Stream |
Unknown
|
...
|
»
Hardware & Soft.txt | Embedded File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\9df274b54410817b3690312b4cb55431\22e94f5071aaed0706b87ec862736685-mat-debug.tmp | Dropped File | ZIP |
Unknown
|
...
|
»
Archive Information
»
Number of Files | 15 |
Number of Folders | 0 |
Size of Packed Archive Contents | 143.07 KB |
Size of Unpacked Archive Contents | 196.02 KB |
File Format | zip |
Contents (15)
»
Filename | Packed Size | Unpacked Size | Compression | Is Encrypted | Modify Time | Actions |
---|---|---|---|---|---|---|
screen.jpeg | 87.69 KB | 95.31 KB | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Videos.txt | 462 Bytes | 716 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Startup.txt | 47 Bytes | 46 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Documents.txt | 865 Bytes | 1.34 KB | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Pictures.txt | 515 Bytes | 799 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Downloads.txt | 28 Bytes | 26 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Hardware & Soft.txt | 720 Bytes | 1.77 KB | Deflate |
![]() |
2020-10-05 18:44 (UTC+2) |
...
|
Others.txt | 114 Bytes | 140 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Cookies.txt | 80 Bytes | 79 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Desktop.txt | 683 Bytes | 1007 Bytes | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
Dirs\Temp.txt | 707 Bytes | 1.16 KB | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|
DBs\Google\Login Data | 817 Bytes | 18.00 KB | Deflate |
![]() |
2017-06-05 11:53 (UTC+2) |
...
|
DBs\Google\Local State | 48.96 KB | 66.04 KB | Deflate |
![]() |
2017-06-05 11:54 (UTC+2) |
...
|
DBs\Google\Cookies | 1018 Bytes | 7.00 KB | Deflate |
![]() |
2017-06-05 11:53 (UTC+2) |
...
|
processes.txt | 520 Bytes | 2.67 KB | Deflate |
![]() |
2020-10-05 18:43 (UTC+2) |
...
|