Try VMRay Platform
Malicious
Classifications

Injector Banking Trojan

Threat Names

Mal/Generic-S CryptOne QBot Mal/HTMLGen-A

Dynamic Analysis Report

Created on 2022-05-16T17:12:09+00:00

d2c969098c9a689728a5f5ac942fa4f75c88738d0367d471276ac4c470504ded.dll

Windows DLL (x86-32)

Remarks (2/2)

(0x02000009): DLL files normally need to be submitted with an appropriate loader. Analysis result may be incomplete if an appropriate loader was not submitted.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "52 days, 2 hours, 2 minutes, 58 seconds" to "6 hours, 14 minutes, 26 seconds" to reveal dormant functionality.

Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\d2c969098c9a689728a5f5ac942fa4f75c88738d0367d471276ac4c470504ded.dll Sample File Binary
Malicious
»
Also Known As C:\Users\RDHJ0C~1\Desktop\d2c969098c9a689728a5f5ac942fa4f75c88738d0367d471276ac4c470504ded.dll (Accessed File)
MIME Type application/vnd.microsoft.portable-executable
File Size 720.53 KB
MD5 6260bbdb6c1f5d1d33557470bcabf8de Copy to Clipboard
SHA1 560d6294f3e965006636e5730c65b438ac1be82b Copy to Clipboard
SHA256 d2c969098c9a689728a5f5ac942fa4f75c88738d0367d471276ac4c470504ded Copy to Clipboard
SSDeep 12288:LD25c7bMl3XyN6VqX1bFJf44pnlG2LniEE2DY04zyHHsPNasifQu8z:H8Aw3CowXrJf44pnw2Ln1RY04uHHsPNp Copy to Clipboard
ImpHash df2c97204ed982b8b3e7393fd2a71059 Copy to Clipboard
File Reputation Information
»
Verdict
Malicious
Names Mal/Generic-S
PE Information
»
Image Base 0x00400000
Entry Point 0x004754D4
Size Of Code 0x00074600
Size Of Initialized Data 0x00036600
File Type IMAGE_FILE_DLL
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 1992-06-20 00:22 (UTC+2)
Version Information (6)
»
LegalCopyright © 2009-2014 Safer-Networking Ltd. All rights reserved.
LegalTrademarks Spybot® and Spybot - Search & Destroy® are registered trademarks.
OriginalFilename blindman.exe
ProductName Spybot - Search & Destroy
ProductVersion 2.4.40.0
Build 20140425
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
CODE 0x00401000 0x000744F8 0x00074600 0x00000400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.51
DATA 0x00476000 0x00001B80 0x00001C00 0x00074A00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 4.66
BSS 0x00478000 0x00000E81 0x00000000 0x00076600 IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 0.0
.idata 0x00479000 0x00002246 0x00002400 0x00076600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 4.9
.reloc 0x0047C000 0x000083C0 0x00008400 0x00078A00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ 6.63
.rsrc 0x00485000 0x0002A200 0x0002A200 0x00080E00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ 7.26
Imports (13)
»
kernel32.dll (36)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
DeleteCriticalSection - 0x00479118 0x00079118 0x00076718 0x00000000
LeaveCriticalSection - 0x0047911C 0x0007911C 0x0007671C 0x00000000
EnterCriticalSection - 0x00479120 0x00079120 0x00076720 0x00000000
InitializeCriticalSection - 0x00479124 0x00079124 0x00076724 0x00000000
VirtualFree - 0x00479128 0x00079128 0x00076728 0x00000000
VirtualAlloc - 0x0047912C 0x0007912C 0x0007672C 0x00000000
LocalFree - 0x00479130 0x00079130 0x00076730 0x00000000
LocalAlloc - 0x00479134 0x00079134 0x00076734 0x00000000
GetTickCount - 0x00479138 0x00079138 0x00076738 0x00000000
QueryPerformanceCounter - 0x0047913C 0x0007913C 0x0007673C 0x00000000
GetVersion - 0x00479140 0x00079140 0x00076740 0x00000000
GetCurrentThreadId - 0x00479144 0x00079144 0x00076744 0x00000000
InterlockedDecrement - 0x00479148 0x00079148 0x00076748 0x00000000
InterlockedIncrement - 0x0047914C 0x0007914C 0x0007674C 0x00000000
VirtualQuery - 0x00479150 0x00079150 0x00076750 0x00000000
WideCharToMultiByte - 0x00479154 0x00079154 0x00076754 0x00000000
MultiByteToWideChar - 0x00479158 0x00079158 0x00076758 0x00000000
lstrlenA - 0x0047915C 0x0007915C 0x0007675C 0x00000000
lstrcpynA - 0x00479160 0x00079160 0x00076760 0x00000000
LoadLibraryExA - 0x00479164 0x00079164 0x00076764 0x00000000
GetThreadLocale - 0x00479168 0x00079168 0x00076768 0x00000000
GetStartupInfoA - 0x0047916C 0x0007916C 0x0007676C 0x00000000
GetProcAddress - 0x00479170 0x00079170 0x00076770 0x00000000
GetModuleHandleA - 0x00479174 0x00079174 0x00076774 0x00000000
GetModuleFileNameA - 0x00479178 0x00079178 0x00076778 0x00000000
GetLocaleInfoA - 0x0047917C 0x0007917C 0x0007677C 0x00000000
GetCommandLineA - 0x00479180 0x00079180 0x00076780 0x00000000
FreeLibrary - 0x00479184 0x00079184 0x00076784 0x00000000
FindFirstFileA - 0x00479188 0x00079188 0x00076788 0x00000000
FindClose - 0x0047918C 0x0007918C 0x0007678C 0x00000000
ExitProcess - 0x00479190 0x00079190 0x00076790 0x00000000
WriteFile - 0x00479194 0x00079194 0x00076794 0x00000000
UnhandledExceptionFilter - 0x00479198 0x00079198 0x00076798 0x00000000
RtlUnwind - 0x0047919C 0x0007919C 0x0007679C 0x00000000
RaiseException - 0x004791A0 0x000791A0 0x000767A0 0x00000000
GetStdHandle - 0x004791A4 0x000791A4 0x000767A4 0x00000000
user32.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetKeyboardType - 0x004791AC 0x000791AC 0x000767AC 0x00000000
LoadStringA - 0x004791B0 0x000791B0 0x000767B0 0x00000000
MessageBoxA - 0x004791B4 0x000791B4 0x000767B4 0x00000000
CharNextA - 0x004791B8 0x000791B8 0x000767B8 0x00000000
advapi32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
RegQueryValueExA - 0x004791C0 0x000791C0 0x000767C0 0x00000000
RegOpenKeyExA - 0x004791C4 0x000791C4 0x000767C4 0x00000000
RegCloseKey - 0x004791C8 0x000791C8 0x000767C8 0x00000000
oleaut32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
SysFreeString - 0x004791D0 0x000791D0 0x000767D0 0x00000000
SysReAllocStringLen - 0x004791D4 0x000791D4 0x000767D4 0x00000000
SysAllocStringLen - 0x004791D8 0x000791D8 0x000767D8 0x00000000
kernel32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
TlsSetValue - 0x004791E0 0x000791E0 0x000767E0 0x00000000
TlsGetValue - 0x004791E4 0x000791E4 0x000767E4 0x00000000
TlsFree - 0x004791E8 0x000791E8 0x000767E8 0x00000000
TlsAlloc - 0x004791EC 0x000791EC 0x000767EC 0x00000000
LocalFree - 0x004791F0 0x000791F0 0x000767F0 0x00000000
LocalAlloc - 0x004791F4 0x000791F4 0x000767F4 0x00000000
advapi32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
RegQueryValueExA - 0x004791FC 0x000791FC 0x000767FC 0x00000000
RegOpenKeyExA - 0x00479200 0x00079200 0x00076800 0x00000000
RegCloseKey - 0x00479204 0x00079204 0x00076804 0x00000000
kernel32.dll (65)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
lstrcpyA - 0x0047920C 0x0007920C 0x0007680C 0x00000000
WriteFile - 0x00479210 0x00079210 0x00076810 0x00000000
WaitForSingleObject - 0x00479214 0x00079214 0x00076814 0x00000000
VirtualQuery - 0x00479218 0x00079218 0x00076818 0x00000000
VirtualAlloc - 0x0047921C 0x0007921C 0x0007681C 0x00000000
Sleep - 0x00479220 0x00079220 0x00076820 0x00000000
SizeofResource - 0x00479224 0x00079224 0x00076824 0x00000000
SetThreadLocale - 0x00479228 0x00079228 0x00076828 0x00000000
SetFilePointer - 0x0047922C 0x0007922C 0x0007682C 0x00000000
SetEvent - 0x00479230 0x00079230 0x00076830 0x00000000
SetErrorMode - 0x00479234 0x00079234 0x00076834 0x00000000
SetEndOfFile - 0x00479238 0x00079238 0x00076838 0x00000000
ResetEvent - 0x0047923C 0x0007923C 0x0007683C 0x00000000
ReadFile - 0x00479240 0x00079240 0x00076840 0x00000000
MulDiv - 0x00479244 0x00079244 0x00076844 0x00000000
LockResource - 0x00479248 0x00079248 0x00076848 0x00000000
LoadResource - 0x0047924C 0x0007924C 0x0007684C 0x00000000
LoadLibraryA - 0x00479250 0x00079250 0x00076850 0x00000000
LeaveCriticalSection - 0x00479254 0x00079254 0x00076854 0x00000000
InitializeCriticalSection - 0x00479258 0x00079258 0x00076858 0x00000000
GlobalUnlock - 0x0047925C 0x0007925C 0x0007685C 0x00000000
GlobalReAlloc - 0x00479260 0x00079260 0x00076860 0x00000000
GlobalHandle - 0x00479264 0x00079264 0x00076864 0x00000000
GlobalLock - 0x00479268 0x00079268 0x00076868 0x00000000
GlobalFree - 0x0047926C 0x0007926C 0x0007686C 0x00000000
GlobalFindAtomA - 0x00479270 0x00079270 0x00076870 0x00000000
GlobalDeleteAtom - 0x00479274 0x00079274 0x00076874 0x00000000
GlobalAlloc - 0x00479278 0x00079278 0x00076878 0x00000000
GlobalAddAtomA - 0x0047927C 0x0007927C 0x0007687C 0x00000000
GetVersionExA - 0x00479280 0x00079280 0x00076880 0x00000000
GetVersion - 0x00479284 0x00079284 0x00076884 0x00000000
GetTickCount - 0x00479288 0x00079288 0x00076888 0x00000000
GetThreadLocale - 0x0047928C 0x0007928C 0x0007688C 0x00000000
GetTempPathA - 0x00479290 0x00079290 0x00076890 0x00000000
GetSystemInfo - 0x00479294 0x00079294 0x00076894 0x00000000
GetStringTypeExA - 0x00479298 0x00079298 0x00076898 0x00000000
GetStdHandle - 0x0047929C 0x0007929C 0x0007689C 0x00000000
GetProcAddress - 0x004792A0 0x000792A0 0x000768A0 0x00000000
GetModuleHandleA - 0x004792A4 0x000792A4 0x000768A4 0x00000000
GetModuleFileNameA - 0x004792A8 0x000792A8 0x000768A8 0x00000000
GetLocaleInfoA - 0x004792AC 0x000792AC 0x000768AC 0x00000000
GetLocalTime - 0x004792B0 0x000792B0 0x000768B0 0x00000000
GetLastError - 0x004792B4 0x000792B4 0x000768B4 0x00000000
GetFullPathNameA - 0x004792B8 0x000792B8 0x000768B8 0x00000000
GetFileSize - 0x004792BC 0x000792BC 0x000768BC 0x00000000
GetExitCodeThread - 0x004792C0 0x000792C0 0x000768C0 0x00000000
GetDiskFreeSpaceA - 0x004792C4 0x000792C4 0x000768C4 0x00000000
GetDateFormatA - 0x004792C8 0x000792C8 0x000768C8 0x00000000
GetCurrentThreadId - 0x004792CC 0x000792CC 0x000768CC 0x00000000
GetCurrentProcessId - 0x004792D0 0x000792D0 0x000768D0 0x00000000
GetCPInfo - 0x004792D4 0x000792D4 0x000768D4 0x00000000
GetACP - 0x004792D8 0x000792D8 0x000768D8 0x00000000
FreeResource - 0x004792DC 0x000792DC 0x000768DC 0x00000000
InterlockedExchange - 0x004792E0 0x000792E0 0x000768E0 0x00000000
FreeLibrary - 0x004792E4 0x000792E4 0x000768E4 0x00000000
FormatMessageA - 0x004792E8 0x000792E8 0x000768E8 0x00000000
FindResourceA - 0x004792EC 0x000792EC 0x000768EC 0x00000000
EnumCalendarInfoA - 0x004792F0 0x000792F0 0x000768F0 0x00000000
EnterCriticalSection - 0x004792F4 0x000792F4 0x000768F4 0x00000000
DeleteCriticalSection - 0x004792F8 0x000792F8 0x000768F8 0x00000000
CreateThread - 0x004792FC 0x000792FC 0x000768FC 0x00000000
CreateFileA - 0x00479300 0x00079300 0x00076900 0x00000000
CreateEventA - 0x00479304 0x00079304 0x00076904 0x00000000
CompareStringA - 0x00479308 0x00079308 0x00076908 0x00000000
CloseHandle - 0x0047930C 0x0007930C 0x0007690C 0x00000000
version.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
VerQueryValueA - 0x00479314 0x00079314 0x00076914 0x00000000
GetFileVersionInfoSizeA - 0x00479318 0x00079318 0x00076918 0x00000000
GetFileVersionInfoA - 0x0047931C 0x0007931C 0x0007691C 0x00000000
gdi32.dll (81)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
UnrealizeObject - 0x00479324 0x00079324 0x00076924 0x00000000
TextOutA - 0x00479328 0x00079328 0x00076928 0x00000000
StretchBlt - 0x0047932C 0x0007932C 0x0007692C 0x00000000
SetWindowOrgEx - 0x00479330 0x00079330 0x00076930 0x00000000
SetWinMetaFileBits - 0x00479334 0x00079334 0x00076934 0x00000000
SetViewportOrgEx - 0x00479338 0x00079338 0x00076938 0x00000000
SetTextColor - 0x0047933C 0x0007933C 0x0007693C 0x00000000
SetTextAlign - 0x00479340 0x00079340 0x00076940 0x00000000
SetStretchBltMode - 0x00479344 0x00079344 0x00076944 0x00000000
SetROP2 - 0x00479348 0x00079348 0x00076948 0x00000000
SetPixel - 0x0047934C 0x0007934C 0x0007694C 0x00000000
SetEnhMetaFileBits - 0x00479350 0x00079350 0x00076950 0x00000000
SetDIBColorTable - 0x00479354 0x00079354 0x00076954 0x00000000
SetBrushOrgEx - 0x00479358 0x00079358 0x00076958 0x00000000
SetBkMode - 0x0047935C 0x0007935C 0x0007695C 0x00000000
SetBkColor - 0x00479360 0x00079360 0x00076960 0x00000000
SelectPalette - 0x00479364 0x00079364 0x00076964 0x00000000
SelectObject - 0x00479368 0x00079368 0x00076968 0x00000000
SelectClipRgn - 0x0047936C 0x0007936C 0x0007696C 0x00000000
SaveDC - 0x00479370 0x00079370 0x00076970 0x00000000
RoundRect - 0x00479374 0x00079374 0x00076974 0x00000000
RestoreDC - 0x00479378 0x00079378 0x00076978 0x00000000
Rectangle - 0x0047937C 0x0007937C 0x0007697C 0x00000000
RectVisible - 0x00479380 0x00079380 0x00076980 0x00000000
RealizePalette - 0x00479384 0x00079384 0x00076984 0x00000000
Polyline - 0x00479388 0x00079388 0x00076988 0x00000000
Polygon - 0x0047938C 0x0007938C 0x0007698C 0x00000000
PlayEnhMetaFile - 0x00479390 0x00079390 0x00076990 0x00000000
Pie - 0x00479394 0x00079394 0x00076994 0x00000000
PatBlt - 0x00479398 0x00079398 0x00076998 0x00000000
MoveToEx - 0x0047939C 0x0007939C 0x0007699C 0x00000000
MaskBlt - 0x004793A0 0x000793A0 0x000769A0 0x00000000
LineTo - 0x004793A4 0x000793A4 0x000769A4 0x00000000
LPtoDP - 0x004793A8 0x000793A8 0x000769A8 0x00000000
IntersectClipRect - 0x004793AC 0x000793AC 0x000769AC 0x00000000
GetWindowOrgEx - 0x004793B0 0x000793B0 0x000769B0 0x00000000
GetWinMetaFileBits - 0x004793B4 0x000793B4 0x000769B4 0x00000000
GetTextMetricsA - 0x004793B8 0x000793B8 0x000769B8 0x00000000
GetTextExtentPoint32A - 0x004793BC 0x000793BC 0x000769BC 0x00000000
GetTextAlign - 0x004793C0 0x000793C0 0x000769C0 0x00000000
GetSystemPaletteEntries - 0x004793C4 0x000793C4 0x000769C4 0x00000000
GetStockObject - 0x004793C8 0x000793C8 0x000769C8 0x00000000
GetPixel - 0x004793CC 0x000793CC 0x000769CC 0x00000000
GetPaletteEntries - 0x004793D0 0x000793D0 0x000769D0 0x00000000
GetObjectA - 0x004793D4 0x000793D4 0x000769D4 0x00000000
GetEnhMetaFilePaletteEntries - 0x004793D8 0x000793D8 0x000769D8 0x00000000
GetEnhMetaFileHeader - 0x004793DC 0x000793DC 0x000769DC 0x00000000
GetEnhMetaFileBits - 0x004793E0 0x000793E0 0x000769E0 0x00000000
GetDeviceCaps - 0x004793E4 0x000793E4 0x000769E4 0x00000000
GetDIBits - 0x004793E8 0x000793E8 0x000769E8 0x00000000
GetDIBColorTable - 0x004793EC 0x000793EC 0x000769EC 0x00000000
GetDCOrgEx - 0x004793F0 0x000793F0 0x000769F0 0x00000000
GetCurrentPositionEx - 0x004793F4 0x000793F4 0x000769F4 0x00000000
GetClipBox - 0x004793F8 0x000793F8 0x000769F8 0x00000000
GetBrushOrgEx - 0x004793FC 0x000793FC 0x000769FC 0x00000000
GetBkMode - 0x00479400 0x00079400 0x00076A00 0x00000000
GetBkColor - 0x00479404 0x00079404 0x00076A04 0x00000000
GetBitmapBits - 0x00479408 0x00079408 0x00076A08 0x00000000
ExtSelectClipRgn - 0x0047940C 0x0007940C 0x00076A0C 0x00000000
ExtCreatePen - 0x00479410 0x00079410 0x00076A10 0x00000000
ExcludeClipRect - 0x00479414 0x00079414 0x00076A14 0x00000000
Ellipse - 0x00479418 0x00079418 0x00076A18 0x00000000
DeleteObject - 0x0047941C 0x0007941C 0x00076A1C 0x00000000
DeleteEnhMetaFile - 0x00479420 0x00079420 0x00076A20 0x00000000
DeleteDC - 0x00479424 0x00079424 0x00076A24 0x00000000
CreateSolidBrush - 0x00479428 0x00079428 0x00076A28 0x00000000
CreateRectRgn - 0x0047942C 0x0007942C 0x00076A2C 0x00000000
CreatePolygonRgn - 0x00479430 0x00079430 0x00076A30 0x00000000
CreatePenIndirect - 0x00479434 0x00079434 0x00076A34 0x00000000
CreatePalette - 0x00479438 0x00079438 0x00076A38 0x00000000
CreateHalftonePalette - 0x0047943C 0x0007943C 0x00076A3C 0x00000000
CreateFontIndirectA - 0x00479440 0x00079440 0x00076A40 0x00000000
CreateDIBitmap - 0x00479444 0x00079444 0x00076A44 0x00000000
CreateDIBSection - 0x00479448 0x00079448 0x00076A48 0x00000000
CreateCompatibleDC - 0x0047944C 0x0007944C 0x00076A4C 0x00000000
CreateCompatibleBitmap - 0x00479450 0x00079450 0x00076A50 0x00000000
CreateBrushIndirect - 0x00479454 0x00079454 0x00076A54 0x00000000
CreateBitmap - 0x00479458 0x00079458 0x00076A58 0x00000000
CopyEnhMetaFileA - 0x0047945C 0x0007945C 0x00076A5C 0x00000000
BitBlt - 0x00479460 0x00079460 0x00076A60 0x00000000
Arc - 0x00479464 0x00079464 0x00076A64 0x00000000
user32.dll (159)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
CreateWindowExA - 0x0047946C 0x0007946C 0x00076A6C 0x00000000
WindowFromPoint - 0x00479470 0x00079470 0x00076A70 0x00000000
WinHelpA - 0x00479474 0x00079474 0x00076A74 0x00000000
WaitMessage - 0x00479478 0x00079478 0x00076A78 0x00000000
UpdateWindow - 0x0047947C 0x0007947C 0x00076A7C 0x00000000
UnregisterClassA - 0x00479480 0x00079480 0x00076A80 0x00000000
UnhookWindowsHookEx - 0x00479484 0x00079484 0x00076A84 0x00000000
TranslateMessage - 0x00479488 0x00079488 0x00076A88 0x00000000
TranslateMDISysAccel - 0x0047948C 0x0007948C 0x00076A8C 0x00000000
TrackPopupMenu - 0x00479490 0x00079490 0x00076A90 0x00000000
SystemParametersInfoA - 0x00479494 0x00079494 0x00076A94 0x00000000
ShowWindow - 0x00479498 0x00079498 0x00076A98 0x00000000
ShowScrollBar - 0x0047949C 0x0007949C 0x00076A9C 0x00000000
ShowOwnedPopups - 0x004794A0 0x000794A0 0x00076AA0 0x00000000
ShowCursor - 0x004794A4 0x000794A4 0x00076AA4 0x00000000
SetWindowsHookExA - 0x004794A8 0x000794A8 0x00076AA8 0x00000000
SetWindowPos - 0x004794AC 0x000794AC 0x00076AAC 0x00000000
SetWindowPlacement - 0x004794B0 0x000794B0 0x00076AB0 0x00000000
SetWindowLongA - 0x004794B4 0x000794B4 0x00076AB4 0x00000000
SetTimer - 0x004794B8 0x000794B8 0x00076AB8 0x00000000
SetScrollRange - 0x004794BC 0x000794BC 0x00076ABC 0x00000000
SetScrollPos - 0x004794C0 0x000794C0 0x00076AC0 0x00000000
SetScrollInfo - 0x004794C4 0x000794C4 0x00076AC4 0x00000000
SetRect - 0x004794C8 0x000794C8 0x00076AC8 0x00000000
SetPropA - 0x004794CC 0x000794CC 0x00076ACC 0x00000000
SetParent - 0x004794D0 0x000794D0 0x00076AD0 0x00000000
SetMenuItemInfoA - 0x004794D4 0x000794D4 0x00076AD4 0x00000000
SetMenu - 0x004794D8 0x000794D8 0x00076AD8 0x00000000
SetForegroundWindow - 0x004794DC 0x000794DC 0x00076ADC 0x00000000
SetFocus - 0x004794E0 0x000794E0 0x00076AE0 0x00000000
SetCursor - 0x004794E4 0x000794E4 0x00076AE4 0x00000000
SetClassLongA - 0x004794E8 0x000794E8 0x00076AE8 0x00000000
SetCapture - 0x004794EC 0x000794EC 0x00076AEC 0x00000000
SetActiveWindow - 0x004794F0 0x000794F0 0x00076AF0 0x00000000
SendMessageA - 0x004794F4 0x000794F4 0x00076AF4 0x00000000
ScrollWindow - 0x004794F8 0x000794F8 0x00076AF8 0x00000000
ScreenToClient - 0x004794FC 0x000794FC 0x00076AFC 0x00000000
RemovePropA - 0x00479500 0x00079500 0x00076B00 0x00000000
RemoveMenu - 0x00479504 0x00079504 0x00076B04 0x00000000
ReleaseDC - 0x00479508 0x00079508 0x00076B08 0x00000000
ReleaseCapture - 0x0047950C 0x0007950C 0x00076B0C 0x00000000
RegisterWindowMessageA - 0x00479510 0x00079510 0x00076B10 0x00000000
RegisterClipboardFormatA - 0x00479514 0x00079514 0x00076B14 0x00000000
RegisterClassA - 0x00479518 0x00079518 0x00076B18 0x00000000
RedrawWindow - 0x0047951C 0x0007951C 0x00076B1C 0x00000000
PtInRect - 0x00479520 0x00079520 0x00076B20 0x00000000
PostQuitMessage - 0x00479524 0x00079524 0x00076B24 0x00000000
PostMessageA - 0x00479528 0x00079528 0x00076B28 0x00000000
PeekMessageA - 0x0047952C 0x0007952C 0x00076B2C 0x00000000
OffsetRect - 0x00479530 0x00079530 0x00076B30 0x00000000
OemToCharA - 0x00479534 0x00079534 0x00076B34 0x00000000
MsgWaitForMultipleObjects - 0x00479538 0x00079538 0x00076B38 0x00000000
MessageBoxA - 0x0047953C 0x0007953C 0x00076B3C 0x00000000
MapWindowPoints - 0x00479540 0x00079540 0x00076B40 0x00000000
MapVirtualKeyA - 0x00479544 0x00079544 0x00076B44 0x00000000
LoadStringA - 0x00479548 0x00079548 0x00076B48 0x00000000
LoadKeyboardLayoutA - 0x0047954C 0x0007954C 0x00076B4C 0x00000000
LoadIconA - 0x00479550 0x00079550 0x00076B50 0x00000000
LoadCursorA - 0x00479554 0x00079554 0x00076B54 0x00000000
LoadBitmapA - 0x00479558 0x00079558 0x00076B58 0x00000000
KillTimer - 0x0047955C 0x0007955C 0x00076B5C 0x00000000
IsZoomed - 0x00479560 0x00079560 0x00076B60 0x00000000
IsWindowVisible - 0x00479564 0x00079564 0x00076B64 0x00000000
IsWindowEnabled - 0x00479568 0x00079568 0x00076B68 0x00000000
IsWindow - 0x0047956C 0x0007956C 0x00076B6C 0x00000000
IsRectEmpty - 0x00479570 0x00079570 0x00076B70 0x00000000
IsIconic - 0x00479574 0x00079574 0x00076B74 0x00000000
IsDialogMessageA - 0x00479578 0x00079578 0x00076B78 0x00000000
IsChild - 0x0047957C 0x0007957C 0x00076B7C 0x00000000
InvalidateRect - 0x00479580 0x00079580 0x00076B80 0x00000000
IntersectRect - 0x00479584 0x00079584 0x00076B84 0x00000000
InsertMenuItemA - 0x00479588 0x00079588 0x00076B88 0x00000000
InsertMenuA - 0x0047958C 0x0007958C 0x00076B8C 0x00000000
InflateRect - 0x00479590 0x00079590 0x00076B90 0x00000000
GetWindowThreadProcessId - 0x00479594 0x00079594 0x00076B94 0x00000000
GetWindowTextA - 0x00479598 0x00079598 0x00076B98 0x00000000
GetWindowRect - 0x0047959C 0x0007959C 0x00076B9C 0x00000000
GetWindowPlacement - 0x004795A0 0x000795A0 0x00076BA0 0x00000000
GetWindowLongA - 0x004795A4 0x000795A4 0x00076BA4 0x00000000
GetWindowDC - 0x004795A8 0x000795A8 0x00076BA8 0x00000000
GetTopWindow - 0x004795AC 0x000795AC 0x00076BAC 0x00000000
GetSystemMetrics - 0x004795B0 0x000795B0 0x00076BB0 0x00000000
GetSystemMenu - 0x004795B4 0x000795B4 0x00076BB4 0x00000000
GetSysColorBrush - 0x004795B8 0x000795B8 0x00076BB8 0x00000000
GetSysColor - 0x004795BC 0x000795BC 0x00076BBC 0x00000000
GetSubMenu - 0x004795C0 0x000795C0 0x00076BC0 0x00000000
GetScrollRange - 0x004795C4 0x000795C4 0x00076BC4 0x00000000
GetScrollPos - 0x004795C8 0x000795C8 0x00076BC8 0x00000000
GetScrollInfo - 0x004795CC 0x000795CC 0x00076BCC 0x00000000
GetPropA - 0x004795D0 0x000795D0 0x00076BD0 0x00000000
GetParent - 0x004795D4 0x000795D4 0x00076BD4 0x00000000
GetWindow - 0x004795D8 0x000795D8 0x00076BD8 0x00000000
GetMenuStringA - 0x004795DC 0x000795DC 0x00076BDC 0x00000000
GetMenuState - 0x004795E0 0x000795E0 0x00076BE0 0x00000000
GetMenuItemInfoA - 0x004795E4 0x000795E4 0x00076BE4 0x00000000
GetMenuItemID - 0x004795E8 0x000795E8 0x00076BE8 0x00000000
GetMenuItemCount - 0x004795EC 0x000795EC 0x00076BEC 0x00000000
GetMenu - 0x004795F0 0x000795F0 0x00076BF0 0x00000000
GetLastActivePopup - 0x004795F4 0x000795F4 0x00076BF4 0x00000000
GetKeyboardState - 0x004795F8 0x000795F8 0x00076BF8 0x00000000
GetKeyboardLayoutList - 0x004795FC 0x000795FC 0x00076BFC 0x00000000
GetKeyboardLayout - 0x00479600 0x00079600 0x00076C00 0x00000000
GetKeyState - 0x00479604 0x00079604 0x00076C04 0x00000000
GetKeyNameTextA - 0x00479608 0x00079608 0x00076C08 0x00000000
GetIconInfo - 0x0047960C 0x0007960C 0x00076C0C 0x00000000
GetForegroundWindow - 0x00479610 0x00079610 0x00076C10 0x00000000
GetFocus - 0x00479614 0x00079614 0x00076C14 0x00000000
GetDesktopWindow - 0x00479618 0x00079618 0x00076C18 0x00000000
GetDCEx - 0x0047961C 0x0007961C 0x00076C1C 0x00000000
GetDC - 0x00479620 0x00079620 0x00076C20 0x00000000
GetCursorPos - 0x00479624 0x00079624 0x00076C24 0x00000000
GetCursor - 0x00479628 0x00079628 0x00076C28 0x00000000
GetClipboardData - 0x0047962C 0x0007962C 0x00076C2C 0x00000000
GetClientRect - 0x00479630 0x00079630 0x00076C30 0x00000000
GetClassNameA - 0x00479634 0x00079634 0x00076C34 0x00000000
GetClassInfoA - 0x00479638 0x00079638 0x00076C38 0x00000000
GetCapture - 0x0047963C 0x0007963C 0x00076C3C 0x00000000
GetActiveWindow - 0x00479640 0x00079640 0x00076C40 0x00000000
FrameRect - 0x00479644 0x00079644 0x00076C44 0x00000000
FindWindowA - 0x00479648 0x00079648 0x00076C48 0x00000000
FillRect - 0x0047964C 0x0007964C 0x00076C4C 0x00000000
EqualRect - 0x00479650 0x00079650 0x00076C50 0x00000000
EnumWindows - 0x00479654 0x00079654 0x00076C54 0x00000000
EnumThreadWindows - 0x00479658 0x00079658 0x00076C58 0x00000000
EndPaint - 0x0047965C 0x0007965C 0x00076C5C 0x00000000
EnableWindow - 0x00479660 0x00079660 0x00076C60 0x00000000
EnableScrollBar - 0x00479664 0x00079664 0x00076C64 0x00000000
EnableMenuItem - 0x00479668 0x00079668 0x00076C68 0x00000000
DrawTextA - 0x0047966C 0x0007966C 0x00076C6C 0x00000000
DrawMenuBar - 0x00479670 0x00079670 0x00076C70 0x00000000
DrawIconEx - 0x00479674 0x00079674 0x00076C74 0x00000000
DrawIcon - 0x00479678 0x00079678 0x00076C78 0x00000000
DrawFrameControl - 0x0047967C 0x0007967C 0x00076C7C 0x00000000
DrawEdge - 0x00479680 0x00079680 0x00076C80 0x00000000
DispatchMessageA - 0x00479684 0x00079684 0x00076C84 0x00000000
DestroyWindow - 0x00479688 0x00079688 0x00076C88 0x00000000
DestroyMenu - 0x0047968C 0x0007968C 0x00076C8C 0x00000000
DestroyIcon - 0x00479690 0x00079690 0x00076C90 0x00000000
DestroyCursor - 0x00479694 0x00079694 0x00076C94 0x00000000
DeleteMenu - 0x00479698 0x00079698 0x00076C98 0x00000000
DefWindowProcA - 0x0047969C 0x0007969C 0x00076C9C 0x00000000
DefMDIChildProcA - 0x004796A0 0x000796A0 0x00076CA0 0x00000000
DefFrameProcA - 0x004796A4 0x000796A4 0x00076CA4 0x00000000
CreatePopupMenu - 0x004796A8 0x000796A8 0x00076CA8 0x00000000
CreateMenu - 0x004796AC 0x000796AC 0x00076CAC 0x00000000
CreateIcon - 0x004796B0 0x000796B0 0x00076CB0 0x00000000
ClientToScreen - 0x004796B4 0x000796B4 0x00076CB4 0x00000000
CheckMenuItem - 0x004796B8 0x000796B8 0x00076CB8 0x00000000
CharNextW - 0x004796BC 0x000796BC 0x00076CBC 0x00000000
CallWindowProcA - 0x004796C0 0x000796C0 0x00076CC0 0x00000000
CallNextHookEx - 0x004796C4 0x000796C4 0x00076CC4 0x00000000
BeginPaint - 0x004796C8 0x000796C8 0x00076CC8 0x00000000
CharNextA - 0x004796CC 0x000796CC 0x00076CCC 0x00000000
CharLowerBuffA - 0x004796D0 0x000796D0 0x00076CD0 0x00000000
CharLowerA - 0x004796D4 0x000796D4 0x00076CD4 0x00000000
CharUpperBuffA - 0x004796D8 0x000796D8 0x00076CD8 0x00000000
CharToOemA - 0x004796DC 0x000796DC 0x00076CDC 0x00000000
AdjustWindowRectEx - 0x004796E0 0x000796E0 0x00076CE0 0x00000000
ActivateKeyboardLayout - 0x004796E4 0x000796E4 0x00076CE4 0x00000000
kernel32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
Sleep - 0x004796EC 0x000796EC 0x00076CEC 0x00000000
oleaut32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
SafeArrayPtrOfIndex - 0x004796F4 0x000796F4 0x00076CF4 0x00000000
SafeArrayGetUBound - 0x004796F8 0x000796F8 0x00076CF8 0x00000000
SafeArrayGetLBound - 0x004796FC 0x000796FC 0x00076CFC 0x00000000
SafeArrayCreate - 0x00479700 0x00079700 0x00076D00 0x00000000
VariantChangeType - 0x00479704 0x00079704 0x00076D04 0x00000000
VariantCopy - 0x00479708 0x00079708 0x00076D08 0x00000000
VariantClear - 0x0047970C 0x0007970C 0x00076D0C 0x00000000
VariantInit - 0x00479710 0x00079710 0x00076D10 0x00000000
comctl32.dll (22)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
ImageList_SetIconSize - 0x00479718 0x00079718 0x00076D18 0x00000000
ImageList_GetIconSize - 0x0047971C 0x0007971C 0x00076D1C 0x00000000
ImageList_Write - 0x00479720 0x00079720 0x00076D20 0x00000000
ImageList_Read - 0x00479724 0x00079724 0x00076D24 0x00000000
ImageList_GetDragImage - 0x00479728 0x00079728 0x00076D28 0x00000000
ImageList_DragShowNolock - 0x0047972C 0x0007972C 0x00076D2C 0x00000000
ImageList_SetDragCursorImage - 0x00479730 0x00079730 0x00076D30 0x00000000
ImageList_DragMove - 0x00479734 0x00079734 0x00076D34 0x00000000
ImageList_DragLeave - 0x00479738 0x00079738 0x00076D38 0x00000000
ImageList_DragEnter - 0x0047973C 0x0007973C 0x00076D3C 0x00000000
ImageList_EndDrag - 0x00479740 0x00079740 0x00076D40 0x00000000
ImageList_BeginDrag - 0x00479744 0x00079744 0x00076D44 0x00000000
ImageList_Remove - 0x00479748 0x00079748 0x00076D48 0x00000000
ImageList_DrawEx - 0x0047974C 0x0007974C 0x00076D4C 0x00000000
ImageList_Draw - 0x00479750 0x00079750 0x00076D50 0x00000000
ImageList_GetBkColor - 0x00479754 0x00079754 0x00076D54 0x00000000
ImageList_SetBkColor - 0x00479758 0x00079758 0x00076D58 0x00000000
ImageList_ReplaceIcon - 0x0047975C 0x0007975C 0x00076D5C 0x00000000
ImageList_Add - 0x00479760 0x00079760 0x00076D60 0x00000000
ImageList_GetImageCount - 0x00479764 0x00079764 0x00076D64 0x00000000
ImageList_Destroy - 0x00479768 0x00079768 0x00076D68 0x00000000
ImageList_Create - 0x0047976C 0x0007976C 0x00076D6C 0x00000000
Digital Signature Information
»
Verification Status Failed
Certificate: VALENTINA SP Z O O
»
Issued by VALENTINA SP Z O O
Parent Certificate Sectigo Public Code Signing CA R36
Country Name PL
Valid From 2022-05-09 02:00 (UTC+2)
Valid Until 2023-05-10 01:59 (UTC+2)
Algorithm sha384_rsa
Serial Number B1 C6 AD C8 BF F4 B5 30 97 DA 1A 18 04 7F 79 C2
Thumbprint 10 78 79 0C 72 7A 6F 24 47 87 88 28 7B 1D B7 A4 05 E5 D6 23
Revoked Since 2022-05-09 02:00 (UTC+2)
Certificate: Sectigo Public Code Signing CA R36
»
Issued by Sectigo Public Code Signing CA R36
Parent Certificate Sectigo Public Code Signing Root R46
Country Name GB
Valid From 2021-03-22 01:00 (UTC+1)
Valid Until 2036-03-22 00:59 (UTC+1)
Algorithm sha384_rsa
Serial Number 62 1D 6D 0C 52 01 9E 3B 90 79 15 20 89 21 1C 0A
Thumbprint 0B C5 E7 67 73 D2 E4 4F C9 90 3D 4D FE FE 45 15 53 BB EC 4A
Certificate: Sectigo Public Code Signing Root R46
»
Issued by Sectigo Public Code Signing Root R46
Country Name GB
Valid From 2021-05-25 02:00 (UTC+2)
Valid Until 2029-01-01 00:59 (UTC+1)
Algorithm sha384_rsa
Serial Number 48 FC 93 B4 60 55 94 8D 36 A7 C9 8A 89 D6 94 16
Thumbprint 32 9B 78 A5 C9 EB C2 04 32 42 DE 90 CE 1B 7C 6B 1B A6 C6 92
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 1.08 KB
MD5 931f25abefa9118951dc8c20560e4158 Copy to Clipboard
SHA1 0120868740db45879a0dff8fea3f641b2abc0d4d Copy to Clipboard
SHA256 1923d229f133d4ab47e7dd37f19f21c97439da19dce79223ca18fd28d74476d5 Copy to Clipboard
SSDeep 24:cOsc+48EFno4guImHwmPL/34TubU7/a0pVhz4qPqoCMu:cOCenoSVHFL/34TubU7/BHhpqoCD Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 880 Bytes
MD5 a56b01536029fdbb2372512aae839bdd Copy to Clipboard
SHA1 2061f3df7e444968fbd782e1450eaa8a8c555627 Copy to Clipboard
SHA256 16f44794edb1d0bcccaa45416a8e3d861f382ebe0a7210f2cbba5ad75323db83 Copy to Clipboard
SSDeep 12:1CvO9iw9z6ByCyd/ghbtFVx6Y+ZH0hoE8iDCP7HNIkh+aMMN3VcNfRtNiAvDCL7:MvozGBW4RFwzVWCPrPh+WVWv2 Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 716 Bytes
MD5 f9246a25bda901f65506d33fcb7a09cd Copy to Clipboard
SHA1 7ac3f48bd6c3923b0e3b7278ead4fd8e736c7770 Copy to Clipboard
SHA256 ea4219d6879ad0e94d0f39771e0c4935bdbe2dd5853a3825347c2a36e06e64f3 Copy to Clipboard
SSDeep 12:zk467cRIvmQ6QNWhlz43sXUt3uwXRxHXYuiY16TxkwxNSTx/qUbGxd:Q46oemQxqzGsE1X3HXYfe6TOj1/b4 Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 664 Bytes
MD5 1a84574b77d9ce5e30fbbc6f7cff3e11 Copy to Clipboard
SHA1 293ce010eba229bad74a049e3386d640b70634b7 Copy to Clipboard
SHA256 ca88e20f80e2c5601da9e1130d7ff701f51b3b65801c0e42816b4d0fde856942 Copy to Clipboard
SSDeep 12:sBifYwK/wXf70mcceZkPtmEzsnPkloaLs5EjTXLJO4hOeQc7Jg2gyrjRK:4ifYl/wv4vu3zsPIoaseXVzhJtrjRK Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 596 Bytes
MD5 1c9772ce9244f63a81e2eed4572357ab Copy to Clipboard
SHA1 f3c70754526f915977e04ff9c4bdce393c15b138 Copy to Clipboard
SHA256 2552531c5486b1cdfbfd97d37bfb5d9fc816a1b8d32c0fce0d17319d0295a060 Copy to Clipboard
SSDeep 12:5+z6N9Ompmlv8lY0tySXZqMqVgrKCrMAagkRktM2UZTgoWE4FvUh0RzMOVHBm913:5+m2iSABty0GMKCYAayWlgoWZVUCHE3 Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 116 Bytes
MD5 8210aca83f59da977d940bfbe39d8e8d Copy to Clipboard
SHA1 9149dc11264501861b1e0908d1ec52f5d54e8ecb Copy to Clipboard
SHA256 022d255c4b36e596d781c96ded1db3fc00f7bbf211ae5206b11bf4cd57edc327 Copy to Clipboard
SSDeep 3:5cknZ1jcOZkF7UoRwqj6XACLnq5ikB:5RZ6OZkF7hlj6XACLnqQkB Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\4jh2kf18\t4[1] Dropped File Text
Clean
»
MIME Type text/plain
File Size 84 Bytes
MD5 620a917dd778c8521eebcbdf6dd5a9f5 Copy to Clipboard
SHA1 8b4e7538d2d93b3db940729f3e927bdc7356d193 Copy to Clipboard
SHA256 b2170f5e904e96b09d207347b5c742c85ffdf11a2912e07c09eea7072f487c93 Copy to Clipboard
SSDeep 3:G5QzA0ZA16cWSuBheFksByLiVc2:G5/11SLIFByLp2 Copy to Clipboard
ImpHash -
c:\wkssvc Dropped File Empty
Clean
»
MIME Type application/x-empty
File Size 0 Bytes
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
c:\srvsvc Dropped File Empty
Clean
»
MIME Type application/x-empty
File Size 0 Bytes
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
c:\lsarpc Dropped File Empty
Clean
»
MIME Type application/x-empty
File Size 0 Bytes
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\counters.dat Modified File Stream
Clean
»
MIME Type application/octet-stream
File Size 128 Bytes
MD5 cc90851958032b8c8bbb7b24ec6271dd Copy to Clipboard
SHA1 e027ad2ea4049374a3b01af2e3626b667dc816bc Copy to Clipboard
SHA256 c2d814a34b184b7cdf10e4e7a4311ff15db99326d6dd8d328b53bf9e19ccf858 Copy to Clipboard
SSDeep 3:Fl: Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image