E:\DR_build\新建文件夹 (7)\bin\Release\DcmEditor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6.exe
Resource
win10v2004-20240802-en
General
-
Target
2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6
-
Size
97KB
-
MD5
36380d5b3231b243386c10682ad76d09
-
SHA1
2ab0ee35b01091a519766cf73f8aff3298e49d3c
-
SHA256
2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6
-
SHA512
56ecd8d80d847b3d4defdce01f439bdb930b191ffa3797f0f3f8b983672c6ac2587c83671551054e4766c66910beabdecf4a5726d566c497b13c19cfc94ad34f
-
SSDEEP
1536:rEMGDc7KzaCprOVcMdj/tf+OZEtckaTP5nMBuONn+RfV437/ZuzG1P3N2Uhy9TD:UnOVcMF/pstBaDqwONnct437Bl3N2U4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6
Files
-
2764e66edcd3f3413c4ca02c8a967e2121b0a93d9f0aa6608d92a537a58258d6.exe windows:5 windows x86 arch:x86
6d1e6deef84631c422310b0447c014f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dcmdxfile
?SetImgProcessParam@KIODDx@@QAEXPBD@Z
?SetImgPreInfoParam@KIODDx@@QAEXPBD@Z
?SetImgStitchPosParam@KIODDx@@QAEXPBD@Z
?SetImgMarkerParam@KIODDx@@QAEXPBD@Z
?SetPatientBodyType@KIODDx@@QAEXPBD@Z
?SetExposureParam@KIODDx@@QAEXPBD@Z
?SetBadLinesParam@KIODDx@@QAEXPBD@Z
?GetImgProcessParam@KIODDx@@QAEPBDXZ
??1KSOPDxMediaStorage@@QAE@XZ
?GetImgStitchPosParam@KIODDx@@QAEPBDXZ
?GetImgMarkerParam@KIODDx@@QAEPBDXZ
?GetPatientBodyType@KIODDx@@QAEPBDXZ
?GetExposureParam@KIODDx@@QAEPBDXZ
?GetBadLinesParam@KIODDx@@QAEPBDXZ
?SaveToFile@KSOPDxMediaStorage@@QAE_NPBD@Z
?LoadFromFile@KSOPDxMediaStorage@@QAE_NPBD@Z
?GetStatusCode@KSOPDxMediaStorage@@QAEKXZ
?GetImgPreInfoParam@KIODDx@@QAEPBDXZ
??0KSOPDxMediaStorage@@QAE@XZ
mfc100
ord13767
ord11726
ord7510
ord7584
ord3839
ord1313
ord310
ord7581
ord901
ord385
ord946
ord1982
ord4283
ord316
ord3439
ord5837
ord5776
ord948
ord6680
ord3744
ord5534
ord12535
ord2881
ord2878
ord7349
ord2417
ord14059
ord14061
ord14060
ord14058
ord14062
ord14045
ord13972
ord13973
ord8228
ord11025
ord3395
ord10883
ord13294
ord8070
ord11154
ord6217
ord9994
ord8351
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord1732
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12482
ord5253
ord2338
ord11060
ord3484
ord2945
ord2944
ord2846
ord11103
ord5123
ord5302
ord9286
ord5858
ord4724
ord11806
ord1012
ord3755
ord2838
ord8231
ord5444
ord6090
ord1263
ord1900
ord1929
ord3254
ord9475
ord4344
ord3390
ord788
ord1210
ord10030
ord422
ord978
ord5539
ord3621
ord5627
ord12868
ord12440
ord5175
ord2611
ord5805
ord8305
ord8330
ord11108
ord8235
ord2416
ord12531
ord5532
ord2752
ord2973
ord2974
ord10360
ord10007
ord8137
ord11067
ord6316
ord5821
ord968
ord6970
ord14075
ord10922
ord13181
ord11413
ord7144
ord13483
ord13480
ord13485
ord13482
ord13484
ord13481
ord3409
ord5238
ord11172
ord11180
ord4078
ord7355
ord9449
ord11184
ord11153
ord11787
ord4622
ord4903
ord5095
ord8439
ord4881
ord5098
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9281
ord8304
ord6112
ord3620
ord12672
ord849
ord1294
ord1890
ord7141
ord1288
ord2163
ord11420
ord11421
ord13301
ord7073
ord13299
ord8486
ord3676
ord3618
ord888
ord6835
ord895
ord7091
ord9399
ord2088
ord1296
ord4389
msvcr100
_setmbcp
__CxxFrameHandler3
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
atoi
memset
kernel32
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
GetClientRect
GetSystemMetrics
IsIconic
SendMessageA
AppendMenuA
GetSystemMenu
LoadIconW
EnableWindow
DrawIcon
comctl32
InitCommonControlsEx
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ