D:\192.168.2.24-SmartECGNet\SDK\Trunk\ECGView\ECGViewerOCX\Release\plugins\SystemSetDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe.dll
Resource
win10v2004-20240412-en
General
-
Target
d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe
-
Size
542KB
-
MD5
98a595d0d261748d4ede64d7675d3d6b
-
SHA1
77bf8b978b6ecf4dbd3f958be214407430489d2c
-
SHA256
d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe
-
SHA512
bf3befe72fe438ee48fb37990d183684259c66189a9345ba9f708a2f873b8cc704613a145cbd7e705956853d19a2254f7536b37c55305403473e36e68cf9e8f9
-
SSDEEP
12288:lEL//e6EII9fgkixj6lqo1JA6TptNOwV/foGOrw3MtJEqzpah2DlI:lEL//e6EII9YpIqosU3MtSqla8lI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe
Files
-
d12d8d3bc49eae08749afa1cb02497f50798874bf96beae34a9d747a967bbefe.dll windows:5 windows x86 arch:x86
f777eb23a71e4c431e077decf63d52ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc100u
ord12413
ord265
ord1298
ord1479
ord11163
ord11683
ord4512
ord3361
ord4808
ord6344
ord381
ord3380
ord3241
ord13047
ord1476
ord1440
ord3746
ord2746
ord8264
ord5802
ord917
ord3368
ord3248
ord3397
ord5846
ord970
ord5227
ord3752
ord8270
ord5325
ord5883
ord1014
ord6996
ord341
ord919
ord7241
ord7246
ord12512
ord12154
ord5198
ord11571
ord7228
ord7914
ord12502
ord3763
ord2844
ord8273
ord6117
ord1266
ord11940
ord7973
ord11494
ord344
ord3626
ord8178
ord10057
ord5303
ord5811
ord4802
ord3373
ord12945
ord7524
ord7876
ord11801
ord337
ord8509
ord12948
ord6869
ord890
ord1292
ord7176
ord322
ord13605
ord4086
ord6140
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord2665
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord6870
ord5185
ord7077
ord2763
ord10906
ord11164
ord6727
ord9957
ord4356
ord1294
ord2509
ord11999
ord892
ord804
ord4360
ord374
ord945
ord2184
ord4197
ord981
ord423
ord290
ord1934
ord5677
ord421
ord979
ord10960
ord13398
ord4276
ord2528
ord2756
ord8372
ord8347
ord266
ord13181
ord2188
ord3482
ord5900
ord3754
ord7903
ord12153
ord12801
ord7911
ord12351
ord12186
ord8497
ord10058
ord12951
ord9525
ord285
ord5264
ord2629
ord280
ord1310
ord2614
ord4805
ord7006
ord4810
ord2062
ord286
ord13305
ord6711
ord3245
ord3372
ord3261
ord950
ord5801
ord5862
ord3446
ord4290
ord1987
ord1450
ord948
ord5229
ord1312
ord921
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11210
ord8112
ord13380
ord10937
ord3402
ord11081
ord8266
ord14060
ord14059
ord14132
ord14149
ord14145
ord1720
ord11544
ord3978
ord4207
ord3260
ord3258
ord3257
ord1271
ord870
ord4355
ord7929
ord4139
ord6858
ord1274
ord8276
ord2847
ord2946
ord6641
ord4150
ord4151
ord11838
ord11123
ord8179
ord10412
ord14147
ord14148
ord14146
ord2418
ord7385
ord2884
ord2887
ord12610
ord5558
ord2748
ord3749
ord7901
ord2617
ord3627
ord2981
ord4767
ord2980
ord897
ord5809
ord8346
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord908
ord2091
ord2055
ord2053
ord2080
ord1984
ord2045
ord3413
ord408
ord1953
ord2090
ord2088
ord1945
ord1873
ord323
ord1301
ord5468
ord4623
ord4794
ord4645
ord5143
ord4901
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord3436
ord1270
ord5556
ord12606
ord2417
ord8277
ord13388
ord7109
ord9493
ord869
ord902
ord13382
ord296
ord385
ord6346
ord13570
ord1300
msvcr100
isspace
strncmp
fseek
ftell
ferror
fprintf
fread
strchr
_vsnprintf_s
fputc
isalnum
tolower
isalpha
_CxxThrowException
memcpy
fopen_s
memset
_snwscanf_s
wcstok
__clean_type_info_names_internal
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_wtol
wcscat_s
wcsrchr
wcsncpy_s
memcpy_s
_itow_s
fclose
__CxxFrameHandler3
strncpy
_purecall
wcscpy_s
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
atoi
sprintf
memchr
memmove
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
_wtoi
_wtof
kernel32
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
LocalAlloc
LocalFree
GlobalUnlock
GlobalLock
GetModuleFileNameW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GlobalFree
GetProcAddress
FreeLibrary
LoadLibraryW
FindClose
FindNextFileW
FindFirstFileW
MultiByteToWideChar
GetProfileStringW
GetLastError
WideCharToMultiByte
user32
GetActiveWindow
SendMessageW
GetWindowRect
GetSystemMetrics
wsprintfW
EnumChildWindows
GetDlgCtrlID
SetWindowTextW
GetKeyState
TranslateMessage
DispatchMessageW
GetWindowLongW
GetFocus
PtInRect
EnableWindow
FillRect
GetWindow
GetTopWindow
RedrawWindow
ShowCaret
GetParent
GetSysColor
CopyRect
GetClientRect
AppendMenuW
CreatePopupMenu
gdi32
ResetDCW
GetTextExtentPoint32W
DeleteObject
GetDeviceCaps
CreateSolidBrush
winspool.drv
ord203
EnumPrintersW
ord204
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
Exports
Exports
InvokeSettingMainView
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ