Automated Malware Analysis Report for Microdicom-3.0.1

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Microdicom-3.0.1 ID: 153765 Sample Name: MicroDicom- 3.0.1-x64.exe Cookbook: default.jbs Time: 13:55:16 Date: 18/07/2019 Version: 26.0.0 Aquamarine Table of Contents Table of Contents 2 Analysis Report MicroDicom-3.0.1-x64.exe 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification 5 Analysis Advice 5 Mitre Att&ck Matrix 6 Signature Overview 6 AV Detection: 6 Spreading: 6 Networking: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 System Summary: 7 Data Obfuscation: 7 Persistence and Installation Behavior: 7 Boot Survival: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 7 Anti Debugging: 8 HIPS / PFW / Operating System Protection Evasion: 8 Language, Device and Operating System Detection: 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus and Machine Learning Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 17 Contacted Domains 17 URLs from Memory and Binaries 17 Contacted IPs 17 Static File Info 17 General 18 File Icon 18 Static PE Info 18 General 18 Entrypoint Preview 18 Rich Headers 19 Copyright Joe Security LLC 2019 Page 2 of 44 Data Directories 19 Sections 20 Resources 20 Imports 20 Possible Origin 21 Network Behavior 21 Code Manipulations 21 Statistics 21 Behavior 21 System Behavior 21 Analysis Process: MicroDicom-3.0.1-x64.exe PID: 2832 Parent PID: 1804 22 General 22 File Activities 22 File Created 22 File Deleted 25 File Written 25 File Read 35 Registry Activities 36 Key Created 36 Key Value Created 36 Key Value Modified 37 Analysis Process: mDicom.exe PID: 3296 Parent PID: 2832 38 General 38 File Activities 38 File Created 38 File Written 39 File Read 43 Registry Activities 44 Key Created 44 Key Value Created 44 Key Value Modified 44 Disassembly 44 Code Analysis 44 Copyright Joe Security LLC 2019 Page 3 of 44 Analysis Report MicroDicom-3.0.1-x64.exe Overview General Information Joe Sandbox Version: 26.0.0 Aquamarine Analysis ID: 153765 Start date: 18.07.2019 Start time: 13:55:16 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 5m 37s Hypervisor based Inspection enabled: false Report type: light Sample file name: MicroDicom-3.0.1-x64.exe Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 11 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: CLEAN Classification: clean4.winEXE@3/19@0/0 EGA Information: Successful, ratio: 50% HDC Information: Successful, ratio: 52.7% (good quality ratio 51.9%) Quality average: 86.9% Quality standard deviation: 21.4% HCA Information: Failed Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .exe Warnings: Show All Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, conhost.exe, CompatTelRunner.exe, WmiPrvSE.exe Report size getting too big, too many NtOpenKeyEx calls found. Report size getting too big, too many NtQueryValueKey calls found. Detection Strategy Score Range Reporting Whitelisted Detection Threshold 4 0 - 100 false Copyright Joe Security LLC 2019 Page 4 of 44 Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 3 0 - 5 true Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Copyright Joe Security LLC 2019 Page 5 of 44 Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior Mitre Att&ck Matrix Privilege Defense Credential Lateral Command and Initial Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Valid Accounts Execution Startup Access Token Masquerading 1 Credential Process Application Clipboard Data Standard through API 1 Items 1 Manipulation 1 Dumping Discovery 2 Deployment Data 1 Encrypted 1 Cryptographic Software Protocol 1 Replication Service Registry Run Startup Software Network Security Remote Data from Exfiltration Over Fallback Through Execution Keys / Startup Items 1 Packing 1 Sniffing Software Services Removable Other Network Channels Removable Folder 1 Discovery 1 Media Medium Media Drive-by Windows Accessibility Process Access Token Input File and Windows Data from Automated Custom Compromise Management Features Injection 1 Manipulation 1 Capture Directory Remote Network Shared Exfiltration Cryptographic Instrumentation Discovery 2 Management Drive Protocol Exploit Public- Scheduled Task System DLL Search Process Credentials System Logon Scripts Input Capture Data Encrypted Multiband Facing Firmware Order Hijacking Injection 1 in Files Information Communication Application Discovery 2 2 Spearphishing Command-Line Shortcut File System Obfuscated Files Account Remote System Shared Data Staged Scheduled Standard Link Interface Modification Permissions or Information 1 Manipulation Discovery Webroot Transfer Cryptographic Weakness Protocol Spearphishing Graphical User Modify Existing New Service DLL Side- Brute Force System Third-party Screen Capture Data Transfer Commonly Attachment Interface Service Loading 1 Owner/User Software Size Limits Used Port Discovery Signature Overview • AV Detection • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • System Summary • Data Obfuscation • Persistence and Installation Behavior • Boot Survival • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section AV Detection: Antivirus or Machine Learning detection for unpacked file Spreading: Contains functionality to enumerate / list files inside a directory Networking: Urls found in memory or binary data Key, Mouse, Clipboard, Microphone and Screen Capturing: Copyright Joe Security LLC 2019 Page 6 of 44 Contains functionality for read data from the clipboard System Summary: Contains functionality to call native functions Contains functionality to shutdown / reboot the system Creates mutexes Detected potential crypto function PE file contains strange resources Sample file is different than original file name gathered from version info Sample reads its own file content Tries to load missing DLLs Classification label Contains functionality to adjust token privileges (e.g. debug / backup) Contains functionality to check free disk space Contains functionality to instantiate COM classes Creates files inside the program directory Creates files inside the user directory Creates temporary files PE file has an executable .text section and no other executable section Reads ini files Reads software policies Spawns processes Uses an in-process (OLE) Automation server Found GUI installer (many successful clicks) Found graphical window changes (likely an installer) Found installer window with terms and condition text Found window with many clickable UI elements (buttons, textforms, scrollbars etc) Creates a directory in C:\Program Files Submission file is bigger than most known malware samples Contains modern PE file flags such as dynamic base (ASLR) or NX Data Obfuscation: Contains functionality to dynamically determine API calls Uses code obfuscation techniques (call, push, ret) Persistence and Installation Behavior: Drops PE files Creates license or readme file Boot Survival: Stores files to the Windows start menu directory Hooking and other Techniques for Hiding and Protection: Disables application error messsages (SetErrorMode) Malware Analysis System Evasion: Checks the free space of harddrives Found dropped PE file which has not been started or loaded Contains functionality to enumerate / list files inside a directory Copyright Joe Security LLC 2019 Page 7 of 44 May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) Program exit points Queries a list of all running processes Anti Debugging: Contains functionality to dynamically determine API calls HIPS / PFW / Operating System Protection Evasion: May try to detect the Windows Explorer process (often used for injection) Language, Device and Operating System Detection: Queries the volume information (name, serial number etc) of a device Contains functionality to query windows version Behavior Graph Hide Legend Legend: Process Signature Created File DNS/IP Info Is Dropped Behavior Graph Is Windows Process ID: 153765 Sample: MicroDicom-3.0.1-x64.exe Number of created Registry Values Startdate: 18/07/2019 Architecture: WINDOWS Number of created Files Score: 4 Visual Basic started Delphi Java MicroDicom-3.0.1-x64.exe .Net C# or VB.NET 29 56 C, C++ or other language Is malicious dropped dropped dropped
Recommended publications
  • Management of Large Sets of Image Data Capture, Databases, Image Processing, Storage, Visualization Karol Kozak
    Management of large sets of image data Capture, Databases, Image Processing, Storage, Visualization Karol Kozak Download free books at Karol Kozak Management of large sets of image data Capture, Databases, Image Processing, Storage, Visualization Download free eBooks at bookboon.com 2 Management of large sets of image data: Capture, Databases, Image Processing, Storage, Visualization 1st edition © 2014 Karol Kozak & bookboon.com ISBN 978-87-403-0726-9 Download free eBooks at bookboon.com 3 Management of large sets of image data Contents Contents 1 Digital image 6 2 History of digital imaging 10 3 Amount of produced images – is it danger? 18 4 Digital image and privacy 20 5 Digital cameras 27 5.1 Methods of image capture 31 6 Image formats 33 7 Image Metadata – data about data 39 8 Interactive visualization (IV) 44 9 Basic of image processing 49 Download free eBooks at bookboon.com 4 Click on the ad to read more Management of large sets of image data Contents 10 Image Processing software 62 11 Image management and image databases 79 12 Operating system (os) and images 97 13 Graphics processing unit (GPU) 100 14 Storage and archive 101 15 Images in different disciplines 109 15.1 Microscopy 109 360° 15.2 Medical imaging 114 15.3 Astronomical images 117 15.4 Industrial imaging 360° 118 thinking. 16 Selection of best digital images 120 References: thinking. 124 360° thinking . 360° thinking. Discover the truth at www.deloitte.ca/careers Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities. Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
    [Show full text]
  • Survey of Databases Used in Image Processing and Their Applications
    International Journal of Scientific & Engineering Research Volume 2, Issue 10, Oct-2011 1 ISSN 2229-5518 Survey of Databases Used in Image Processing and Their Applications Shubhpreet Kaur, Gagandeep Jindal Abstract- This paper gives review of Medical image database (MIDB) systems which have been developed in the past few years for research for medical fraternity and students. In this paper, I have surveyed all available medical image databases relevant for research and their use. Keywords: Image database, Medical Image Database System. —————————— —————————— 1. INTRODUCTION Measurement and recording techniques, such as electroencephalography, magnetoencephalography Medical imaging is the technique and process used to (MEG), Electrocardiography (EKG) and others, can create images of the human for clinical purposes be seen as forms of medical imaging. Image Analysis (medical procedures seeking to reveal, diagnose or is done to ensure database consistency and reliable examine disease) or medical science. As a discipline, image processing. it is part of biological imaging and incorporates radiology, nuclear medicine, investigative Open source software for medical image analysis radiological sciences, endoscopy, (medical) Several open source software packages are available thermography, medical photography and for performing analysis of medical images: microscopy. ImageJ 3D Slicer ITK Shubhpreet Kaur is currently pursuing masters degree OsiriX program in Computer Science and engineering in GemIdent Chandigarh Engineering College, Mohali, India. E-mail: MicroDicom [email protected] FreeSurfer Gagandeep Jindal is currently assistant processor in 1.1 Images used in Medical Research department Computer Science and Engineering in Here is the description of various modalities that are Chandigarh Engineering College, Mohali, India. E-mail: used for the purpose of research by medical and [email protected] engineering students as well as doctors.
    [Show full text]
  • Schmidt BT 2020.Pdf
    FRIEDRICH-ALEXANDER-UNIVERSITÄT ERLANGEN-NÜRNBERG TECHNISCHE FAKULTÄT • DEPARTMENT INFORMATIK Lehrstuhl für Informatik 10 (Systemsimulation) Investigation and Implementation of Visualization and Reconstruction Options for Breast-CT Simon Schmidt Bachelorthesis Investigation and Implementation of Visualization and Reconstruction Options for Breast-CT Simon Schmidt Bachelorthesis Aufgabensteller: Prof. Dr.-Ing. Harald Köstler Betreuer: Dr. David Heinemann (AB-CT) Bearbeitungszeitraum: 1.6.2020 – 2.11.2020 Erklärung: Ich versichere, dass ich die Arbeit ohne fremde Hilfe und ohne Benutzung anderer als der angegebenen Quellen angefertigt habe und dass die Arbeit in gleicher oder ähn- licher Form noch keiner anderen Prüfungsbehörde vorgelegen hat und von dieser als Teil einer Prüfungsleistung angenommen wurde. Alle Ausführungen, die wörtlich oder sinngemäß übernommen wurden, sind als solche gekennzeichnet. Der Universität Erlangen-Nürnberg, vertreten durch den Lehrstuhl für Systemsimulati- on (Informatik 10), wird für Zwecke der Forschung und Lehre ein einfaches, kostenloses, zeitlich und örtlich unbeschränktes Nutzungsrecht an den Arbeitsergebnissen der Ba- chelorthesis einschließlich etwaiger Schutzrechte und Urheberrechte eingeräumt. Erlangen, den 1. November 2020 . Abstract The nu:view Breast-CT is the worlds first spiral Breast-CT. While already in clinical use, the system is still under on-going development. In the current clinical workflow, the acquired scans have to be reconstructed and then transferred to the clinical network before they can be reviewed on a workstation in another room. As the necessary amount of data for a single scan is huge, this can take long times. The goal of this thesis was therefore, to improve on those weak points by investigating viewing options which could be used in close proximity to the scanner.
    [Show full text]
  • Vendor Questions and Answers
    COMMUNITY COLLEGE OF ALLEGHENY COUNTY PURCHASING DEPARTMENT 800 ALLEGHENY AVENUE, PITTSBURGH, PA 15233 ADDENDUM 1 REQUEST FOR PROPOSAL 3104 NETWORK ACCESS CONTROL SOLUTION APRIL 10, 2018 The following additional information is hereby made a part of this RFP: **************************************************************************** See the accompanying vendor compliance matrix. See accompanying “Addendum A” (partial listing of network devices and protocols/services/applications that NAC solution must support). The protocols include listing from the current RFPs’ appendixes. It should be noted this is not an all-inclusive list, the chosen NAC solution should support all standard protocols or provide explanation of non- support. See accompanying Addendum B - Partial listing existing desktop and server software applciartions (referred to in questions 27 on page 9 of the RFP). “Addendum C” – listing of existing college network equipment Vendor Questions and Answers: 1. What is the VPN Gateway technology being used? (sec 2.1) Fortinet FortiGate 2. Can further clarifications be made regarding "specific settings to the endpoint to operate." be identified? Is the provisioning of administrative accounts per host impacted by this function? (Section 3.1 statement 7) It is desired that the proposed NAC solution should not require or expect any specific setting or component on the end-user system to be exist or configured in order the NAC solution to provide all its functionality. If the NAC solution requires certain software component(s) to exist on the end user systems, the vendors must provide detailed information about their proposed system and how it would function in the college’s environment. 3. Please elaborate on what "relevant information" refers to, respective to information being shared with other college systems.
    [Show full text]
  • Research Article Software Framework for the Creation and Application of Personalized Bone and Plate Implant Geometrical Models
    Hindawi Journal of Healthcare Engineering Volume 2018, Article ID 6025935, 11 pages https://doi.org/10.1155/2018/6025935 Research Article Software Framework for the Creation and Application of Personalized Bone and Plate Implant Geometrical Models Nikola Vitkovic´ , Srd�an Mladenovic´, Milan Trifunovic´, Milan Zdravkovic´, Miodrag Manic´, Miroslav Trajanovic´, Dragan Misˇic´, and Jelena Mitic´ Faculty of Mechanical Engineering, University of Niˇs, Niˇs, Serbia Correspondence should be addressed to Nikola Vitkovic´; [email protected] Received 25 June 2018; Revised 30 August 2018; Accepted 12 September 2018; Published 10 October 2018 Academic Editor: Emiliano Schena Copyright © 2018 Nikola Vitkovic´ et al. *is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Computer-Assisted Orthopaedic Surgery (CAOS) defines a set of techniques that use computers and other devices for planning, guiding, and performing surgical interventions. *e important components of CAOS are accurate geometrical models of human bones and plate implants, which can be used in preoperational planning or for surgical guiding during an intervention. Software framework which is introduced in this study is based on the Model-View-Controller (MVC) architectural pattern, and it uses 3D models of bones and plate implants developed by the application of the Method of Anatomical Features (MAF). *e presented framework may be used for preoperative planning processes and for the production of personalized plate implants. *e main idea of the research was to develop a novel integrated software framework which will provide improved personalized healthcare to the patient, and at the same time, provide the surgeon with more control over the patient’s treatment and recovery.
    [Show full text]
  • List of Computational Software
    Appendix A List of Computational Software A.1 DICOM Viewers The listed DICOM viewers have similar functionality Acculite www.accuimage.com MicroDicom www.microdicom.com DICOM Works www.dicomworks.com Sante DICOM Viewer www.santesoft.com Mango ric.uthscsa.edu/mango OsiriX (MAC) www.osirix-viewer.com AMIDE amide.sourceforge.net Irfanview www.irfanview.com XNView www.xnview.com A.2 Open Source Medical Imaging and Segmentation CVIPTools A UNIX/Win32-based package and contains a collection of C and C++computer imaging tools that includes edge/line detec- tion, segmentation, and many other functions (www.ee.siue.edu/CVIPtools) Fiji/ImageJ A Java-based image processing package that uses additional plugins for a variety of functionalities including segmentation algorithms (pacific.mpi-cbg.de/wiki/index.php/Fiji) GemIdent An interactive program that is designed for colour segmentation in images with few colours, and the objects of interest look alike with small variation (www.gemident.com) ITK-SNAP An interactive software application that allows users to nav- igate three-dimensional medical images, manually delineate anatomical regions of interest, and perform automatic image segmentation (www.itksnap.org) J. Tu et al., Computational Fluid and Particle Dynamics in the Human Respiratory System, 339 Biological and Medical Physics, Biomedical Engineering DOI 10.1007/978-94-007-4488-2, © Springer Science+Business Media Dordrecht 2013 340 Appendix A List of Computational Software Megawave 2 Made up of C library modules, that contains original algorithms written by researchers and is run using Unix/Linux (megawave.cmla.ens-cachan.fr) MITK and 3Dmed Made up of C++ library for integrated medical image process- ing, segmentation, and registration algorithms (www.mitk.net/download.htm) Slicer Has a GUI that allows manual and automatic segmentation, reg- istration, and three-dimensional visualization.
    [Show full text]
  • Şule Beste KAPÇI Danışman Dr. Öğr. Üyesi Turgay AYDOĞAN YÜKSEK
    T.C. SÜLEYMAN DEMİREL ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ MEDİKAL GÖRÜNTÜLER ÜZERİNDE ANALİZ VE SINIFLANDIRMA YAPMAK İÇİN BİR UYGULAMA TASARIMI Şule Beste KAPÇI Danışman Dr. Öğr. Üyesi Turgay AYDOĞAN YÜKSEK LİSANS TEZİ BİLGİSAYAR MÜHENDİSLİĞİ ANABİLİM DALI ISPARTA- 2020 © 2020 [Şule Beste KAPÇI] TEZ ONAYI Şule Beste KAPÇI tarafından hazırlanan "Medikal Görüntüler Üzerinde Analiz ve Sınıflandırma Yapmak için Bir Uygulama Tasarımı" adlı tez çalışması aşağıdaki jüri üyeleri önünde Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Bilgisayar Mühendisliği Anabilim Dalı’nda YÜKSEK LİSANS TEZİ olarak başarı ile savunulmuştur. Danışman Dr.Öğr.Üyesi Turgay AYDOĞAN .............................. Süleyman Demirel Üniversitesi Jüri Üyesi Prof.Dr.Ecir Uğur KÜÇÜKSİLLE .............................. Süleyman Demirel Üniversitesi Jüri Üyesi Dr.Öğr.Üyesi Tuna GÖKSU .............................. Isparta Uygulamalı Bilimler Üniversitesi Enstitü Müdürü Doç. Dr. Şule Sultan UĞUR .............................. İÇİNDEKİLER Sayfa İÇİNDEKİLER ......................................................................................................................... i ÖZET ......................................................................................................................................... iii ABSTRACT .............................................................................................................................. iv TEŞEKKÜR .............................................................................................................................
    [Show full text]
  • An Medical Image File Formats and Digital Image Conversion
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-1S4, December 2019 An Medical Image File Formats and Digital Image Conversion P. Sriramakrishnan, T. Kalaiselvi, S.T. Padmapriya, N. Shanthi, S. Ramkumar, N. Kalaichelvi and equipment setting. Medical image data was aligned in the Abstract: Medical image file formats make the confusing form of an array of picture element called as the pixel in two aspect to young researchers who start work with medical images. dimensional and voxel in three dimensional [2]. Medical image format conversion is still a tedious task due to the different structure of files. Digital image conversion from the Image format describes the standardized procedure to store medical image is an important pre-processing step to the process the data inside an image. Medical image dataset contains and visualizes the data. This article presents an overview of the more images to represent the three-dimensional view. major medical image file formats such as Analyze, neuro-imaging Medical image intimates the information about the number of informatics technology initiative (NIFTI), MINC, and digital pixels in the horizontal and vertical direction, number of bits imaging and communications in medicine (DICOM). Then the per pixel and number of images per subject. Further, medical characteristics and strengths of the various formats are discussed. Also the article describes the easiest way of digital image format needs to be converting into digital format for process conversion from medical image format. and visualize the images. Medical image format conversion is Keywords: Medical image, file formats, NIFTI, DICOM, a critical task for researchers that can be done by open source Analyze, file conversion software packages such as Mango, MRIcro, 3D slicer, MicroDicom, etc., [5].
    [Show full text]
  • Metodología Para El Registro Multimodal De Imágenes 3D Utilizando Información Mutua
    Metodología para el registro multimodal de imágenes 3D utilizando información mutua Oscar Andrés Vélez Martínez Director: Álvaro Ángel Orozco Gutiérrez Universidad Tecnológica de Pereira Facultad de Ingenierías Eléctrica, Electrónica, Física y Ciencias de la Computación Maestría en Ingeniería Eléctrica Pereira-Risaralda 2014 Índice general Resumen 3 1. Introducción 5 2. Justificación 7 2.1. Pertinencia . .7 2.2. Viabilidad . .7 2.3. Impacto . .8 3. Planteamiento del problema 9 3.1. Aspectos médicos . .9 3.2. Registro de imágenes médicas . .9 3.3. Formulación del problema de investigación . 10 4. Objetivos 11 4.1. General . 11 4.2. Específicos . 11 5. Antecedentes bibliográficos 12 5.1. Métodos basados en registro rígido . 12 5.2. Métodos basados registro no rígido . 14 5.3. Registro multimodal usando información mutua. 16 6. Marco Conceptual 19 6.1. Filtrado de imágenes . 19 6.2. Transformaciones . 21 6.2.1. Transformación rígida . 21 6.2.2. Transformación afín . 22 6.2.3. Transformación de perspectiva . 22 6.2.4. Transformación elástica . 22 6.3. Registro de imágenes . 23 6.3.1. Registro usando marcadores externos . 23 6.3.2. Registro usando marcadores anatómicos . 24 6.3.3. Registro usando medidas volumétricas . 24 6.3.4. Registro multimodal usando información mútua . 26 7. Materiales 28 7.1. Bases de Datos . 28 2 7.2. Cajas de herramientas . 29 7.2.1. Toolbox de Procesamiento de imágenes . 29 7.2.2. 3D Slicer . 29 7.2.3. MicroDICOM shell extension . 30 7.2.4. ITK: Herramienta de Segmentación y Registro . 31 8. Metodología 32 8.1. Módulo de Filtrado .
    [Show full text]
  • Osirix Free Download Windows Download Link Sent Successfully
    osirix free download windows Download Link Sent Successfully. A download link has been sent to the provided email address. Follow the instructions provided in this e-mail to download OsiriX Lite. If the message cannot be found, please check your Junk folder. If you didn’t receive the email, use the New User form . OsiriX MD Full-Featured Version. Get OsiriX MD, the complete edition of OsiriX. With ultrafast performance and an intuitive interactive user interface, it is the most widely used medical images viewer in the world. Download OsiriX Lite. OsiriX Lite is the complete demo version of OsiriX MD. Are you a new user or did you already download OsiriX Lite from here? Not sure? Select “New User”. OsiriX MD Full-Featured Version (from $69.99/mo) Get OsiriX MD, the complete edition of OsiriX. With ultrafast performance and an intuitive interactive user interface, it is the most widely used medical images viewer in the world. Ultrafast performance Intuitive interactive user interface The most widely used DICOM viewer in the world FDA & CE certified Install in less than 5 minutes. Disclaimer. THIS SOFTWARE IS NOT INTENDED FOR PRIMARY DIAGNOSTIC, ONLY FOR SCIENTIFIC USAGE. THIS VERSION OF OSIRIX IS NOT CERTIFIED AS A MEDICAL DEVICE FOR PRIMARY DIAGNOSIS. THERE ARE NO CERTIFICATIONS. YOU CAN ONLY USE OSIRIX AS A REVIEWING AND SCIENTIFIC SOFTWARE, NOT FOR PRIMARY DIAGNOSTIC. CERTIFIED VERSION OF OSIRIX IS AVAILABLE HERE: OSIRIX MD. All calculations, measurements and images provided by this software are intended only for scientific research. Any other use is entirely at the discretion and risk of the user.
    [Show full text]
  • COMPUTER AIDED TISSUE ENGINEERING for the GENERATION of UNIT LIBRARY STRUCTURE of SCAFFOLD for HUMAN BONE (In-Vitro)
    COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro) A Thesis submitted in partial fulfilment of the requirements for the degree of Master of Technology in Biomedical Engineering by ROHAN VINAYAK BHAGWAT 213BM1002 Under The Supervision of Prof. (Mrs.) Krishna Pramanik Department of Biotechnology & Medical Engineering National Institute of Technology Rourkela-769008, Orissa, India June, 2015 National Institute of Technology Rourkela CERTIFICATE This is to certify that the thesis entitled, “COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro)” submitted by Rohan Vinayak Bhagwat (213BM1002) in partial fulfillment of the requirements for the award of degree of Master of Technology in Biomedical Engineering at National Institute of Technology, Rourkela is an authentic work carried out by him under my supervision and guidance. To the best of my knowledge, the matter embodied in the thesis has not been submitted to any other University/Institute for the award of any Degree or Diploma. Place: Rourkela Supervisor Date Prof. Krishna Pramanik Department of Biotechnology and Medical Engineering National Institute of Technology, Rourkela-769008 i DECLARATION The present study entitled “COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro)” is based on my original research work and no part of the thesis has been so far submitted for the award of degree in Master of Technology in Biomedical engineering or any other degree or diploma to the NIT Rourkela, Orissa, India or elsewhere. Place: Rourkela, Odhisa ROHAN VINAYAK BHAGWAT Date: ii ACKNOWLEDGEMENT It is my pleasure to take the opportunity of expressing my sincere gratitude to all those people who provided their support, collaboration and encouragement to carry out my dissertation work.
    [Show full text]
  • GPU Accelerated Applications Catalog
    GPU-ACCELERATED APPLICATIONS Test Drive the World’s Fastest Accelerator – Free! Take the GPU Test Drive, a free and easy way to experience accelerated computing on GPUs. You can run your own application or try one of the preloaded ones, all running on a remote cluster. Try it today. www.nvidia.com/gputestdrive GPU-ACCELERATED APPLICATIONS Accelerated computing has revolutionized a broad range of industries with over five hundred applications optimized for GPUs to help you accelerate your work. CONTENTS 1 Computational Finance 2 Climate, Weather and Ocean Modeling 2 Data Science and Analytics 5 Artificial Intelligence DEEP LEARNING AND MACHINE LEARNING 9 Federal, Defense and Intelligence 10 Design for Manufacturing/Construction: CAD/CAE/CAM COMPUTATIONAL FLUID DYNAMICS COMPUTATIONAL STRUCTURAL MECHANICS DESIGN AND VISUALIZATION ELECTRONIC DESIGN AUTOMATION INDUSTRIAL INSPECTION 19 Media & Entertainment ANIMATION, MODELING AND RENDERING COLOR CORRECTION AND GRAIN MANAGEMENT COMPOSITING, FINISHING AND EFFECTS EDITING ENCODING AND DIGITAL DISTRIBUTION ON-AIR GRAPHICS ON-SET, REVIEW AND STEREO TOOLS WEATHER GRAPHICS 26 Medical Imaging 29 Oil and Gas 30 Research: Higher Education and Supercomputing COMPUTATIONAL CHEMISTRY AND BIOLOGY NUMERICAL ANALYTICS PHYSICS SCIENTIFIC VISUALIZATION 41 Safety and Security 44 Tools and Management Computational Finance APPLICATION NAME COMPANY/DEVELOPER PRODUCT DESCRIPTION SUPPORTED FEATURES GPU SCALING Accelerated Elsen Secure, accessible, and accelerated back- • Web-like API with Native bindings for Multi-GPU Computing Engine testing, scenario analysis, risk analytics Python, R, Scala, C Single Node and real-time trading designed for easy • Custom models and data streams are integration and rapid development. easy to add Adaptiv Analytics SunGard A flexible and extensible engine for fast • Existing models code in C# supported Multi-GPU calculations of a wide variety of pricing transparently, with minimal code Single Node and risk measures on a broad range of changes asset classes and derivatives.
    [Show full text]