D:\192.168.2.24-SmartECGNet\SDK\Trunk\ECGView\ECGViewerOCX\Release\plugins\RichEditDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687.dll
Resource
win10v2004-20240412-en
General
-
Target
135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687
-
Size
254KB
-
MD5
bf515c53d2542e2aa180fed483f9511c
-
SHA1
c20ec13ec895905f642700b2260899d2f3db6ec1
-
SHA256
135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687
-
SHA512
1251f5e8d9491f12feab08363680b54255a514831b7b8e6d26ab463977d3ac8fe21c868015fb8edb057c0dec701dd9d60f217f966c65fc51f065e88e62010c40
-
SSDEEP
3072:m8JRIOgZ7mbkvqkjRK1T4wwij73qtEOfd/zEPgikIQ7FlYb/RB:HJR9w6k3jkcw76tEOf1zEPCIAH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687
Files
-
135b635005498dbb1f48b09ba6c46f73f91de0277a25dda66f6abe6d0b461687.dll windows:5 windows x86 arch:x86
d155d0fb874e6f532330f9decd397a17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc100u
ord2981
ord3627
ord10412
ord10058
ord8179
ord11123
ord2062
ord3436
ord2617
ord7901
ord3749
ord2748
ord8266
ord5809
ord921
ord2943
ord2841
ord6114
ord1262
ord5855
ord2185
ord1905
ord1934
ord6996
ord12945
ord7528
ord13047
ord788
ord1212
ord10081
ord3978
ord422
ord980
ord5563
ord3628
ord5652
ord5227
ord5624
ord12663
ord10906
ord5828
ord6869
ord890
ord1292
ord1956
ord1895
ord12753
ord7176
ord322
ord13605
ord4086
ord6140
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord4901
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord5799
ord2184
ord4360
ord2980
ord8264
ord2746
ord917
ord1479
ord945
ord3428
ord374
ord11940
ord12948
ord4139
ord7006
ord7973
ord4805
ord7210
ord11683
ord4150
ord4151
ord11801
ord13214
ord7913
ord7914
ord11838
ord7524
ord1440
ord2629
ord285
ord5264
ord2614
ord4519
ord12953
ord12321
ord6300
ord5242
ord12154
ord420
ord7527
ord5241
ord7529
ord7967
ord11998
ord6080
ord5862
ord3446
ord1987
ord796
ord12186
ord4355
ord12662
ord5623
ord2528
ord10960
ord979
ord421
ord7526
ord11494
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord2756
ord5556
ord12606
ord2417
ord11163
ord8347
ord6289
ord9525
ord6711
ord3261
ord1013
ord5882
ord8269
ord2780
ord3751
ord7902
ord2618
ord3438
ord13366
ord2410
ord948
ord381
ord6344
ord316
ord903
ord1320
ord4478
ord4512
ord5802
ord1476
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11210
ord8112
ord13380
ord10937
ord3402
ord11081
ord8277
ord14060
ord14059
ord280
ord12413
ord6172
ord14132
ord1450
ord12785
ord6179
ord7911
ord4290
ord286
ord1310
ord12783
ord1298
ord3397
ord908
ord2091
ord2055
ord2053
ord2080
ord1984
ord2045
ord3413
ord408
ord1953
ord2090
ord2088
ord1945
ord1873
ord323
ord1301
ord6870
ord266
ord265
ord3846
ord5229
ord4511
ord12822
ord1312
ord902
ord2068
ord296
ord1270
ord869
ord1244
ord897
ord6099
ord8346
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord5468
ord4623
ord14149
ord14145
ord14147
ord14148
ord14146
ord4794
ord4645
ord7929
ord5143
ord2418
ord7385
ord2884
ord2887
ord12610
ord5558
ord13567
ord1300
msvcr100
strncpy
wcschr
fwrite
wcscpy_s
_wtoi
_waccess
fopen
_vswprintf
__clean_type_info_names_internal
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
memset
memcpy
__CxxFrameHandler3
_ltow_s
wcstok
fclose
fflush
kernel32
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
LocalAlloc
LocalFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
lstrcmpiW
GetProcessHeap
HeapFree
HeapAlloc
CopyFileW
DeleteFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
MulDiv
GetProfileStringW
MultiByteToWideChar
WideCharToMultiByte
user32
SetWindowTextW
GetWindowTextW
GetClassNameW
EnumChildWindows
IsWindow
GetDlgCtrlID
GetCursorPos
GetSysColor
OffsetRect
DrawFocusRect
GetNextDlgGroupItem
ClientToScreen
WindowFromPoint
GetWindowLongW
GetParent
InvalidateRect
SetWindowRgn
DrawEdge
LoadBitmapW
GetCapture
ReleaseCapture
DrawIcon
GetSystemMetrics
IsIconic
GetWindowRect
LoadIconW
ReleaseDC
GetDC
GetClientRect
SetRect
CopyRect
SendMessageW
EnableWindow
wsprintfW
gdi32
GetDeviceCaps
CreateFontW
GetObjectW
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
StretchBlt
GetPixel
DeleteObject
EnumFontsW
CreateCompatibleDC
CreateDCW
SelectClipRgn
CreateRectRgn
CombineRgn
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
StrCpyW
ole32
StgCreateDocfile
Exports
Exports
ShowDlg
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ