Automated Malware Analysis Report for Imageio-2.8.0

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Imageio-2.8.0 ID: 228893 Sample Name: imageio-2.8.0- py3-none-any.whl Cookbook: default.jbs Time: 04:10:40 Date: 11/05/2020 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report imageio-2.8.0-py3-none-any.whl 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification Spiderchart 5 Mitre Att&ck Matrix 5 Signature Overview 6 Software Vulnerabilities: 6 Networking: 6 System Summary: 6 Hooking and other Techniques for Hiding and Protection: 6 Malware Analysis System Evasion: 7 Anti Debugging: 7 HIPS / PFW / Operating System Protection Evasion: 7 Language, Device and Operating System Detection: 7 Malware Configuration 7 Behavior Graph 7 Simulations 8 Behavior and APIs 8 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 8 Yara Overview 8 Initial Sample 8 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Sigma Overview 9 Joe Sandbox View / Context 9 IPs 9 Domains 9 ASN 9 JA3 Fingerprints 9 Dropped Files 9 Screenshots 9 Thumbnails 9 Startup 10 Created / dropped Files 10 Domains and IPs 25 Contacted Domains 25 URLs from Memory and Binaries 25 Contacted IPs 26 Static File Info 26 General 26 File Icon 26 Network Behavior 27 Code Manipulations 27 Statistics 27 Behavior 27 System Behavior 27 Analysis Process: unarchiver.exe PID: 3980 Parent PID: 1260 27 Copyright Joe Security LLC 2020 Page 2 of 66 General 27 File Activities 27 File Created 28 File Written 28 File Read 29 Analysis Process: 7za.exe PID: 4740 Parent PID: 3980 29 General 29 File Activities 29 File Created 29 File Written 32 File Read 65 Analysis Process: conhost.exe PID: 2336 Parent PID: 4740 65 General 65 Disassembly 66 Code Analysis 66 Copyright Joe Security LLC 2020 Page 3 of 66 Analysis Report imageio-2.8.0-py3-none-any.whl Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 228893 Start date: 11.05.2020 Start time: 04:10:40 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 3m 32s Hypervisor based Inspection enabled: false Report type: light Sample file name: imageio-2.8.0-py3-none-any.whl (renamed file extension from whl to zip) Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 3 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis Mode: default Analysis stop reason: Timeout Detection: CLEAN Classification: clean2.winZIP@4/51@0/0 EGA Information: Failed HDC Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Stop behavior analysis, all processes terminated Warnings: Show All Execution Graph export aborted for target unarchiver.exe, PID 3980 because it is empty Detection Strategy Score Range Reporting Whitelisted Detection Threshold 2 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Copyright Joe Security LLC 2020 Page 4 of 66 Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Spiderchart Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Mitre Att&ck Matrix Copyright Joe Security LLC 2020 Page 5 of 66 Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Windows Winlogon Process Disabling Security Credential Virtualization/Sandbox Application Data from Data Standard Eavesdrop on Accounts Remote Helper DLL Injection 1 1 Tools 1 Dumping Evasion 2 Deployment Local Encrypted 1 Cryptographic Insecure Management Software System Protocol 1 Network Communication Replication Service Port Accessibility Virtualization/Sandbox Network System Information Remote Data from Exfiltration Fallback Exploit SS7 to Through Execution Monitors Features Evasion 2 Sniffing Discovery 2 Services Removable Over Other Channels Redirect Phone Removable Media Network Calls/SMS Media Medium External Windows Accessibility Path Process Input Query Registry Windows Data from Automated Custom Exploit SS7 to Remote Management Features Interception Injection 1 1 Capture Remote Network Exfiltration Cryptographic Track Device Services Instrumentation Management Shared Protocol Location Drive Drive-by Scheduled System DLL Search Obfuscated Files or Credentials System Network Logon Input Data Multiband SIM Card Compromise Task Firmware Order Information 1 in Files Configuration Scripts Capture Encrypted Communication Swap Hijacking Discovery Signature Overview • Software Vulnerabilities • Networking • System Summary • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section Software Vulnerabilities: Found inlined nop instructions (likely shell or obfuscated code) Networking: Urls found in memory or binary data System Summary: Detected potential crypto function Classification label Creates mutexes Creates temporary files Parts of this applications are using the .NET runtime (Probably coded in C#) Reads software policies Spawns processes Submission file is bigger than most known malware samples Uses new MSVCR Dlls Hooking and other Techniques for Hiding and Protection: Disables application error messsages (SetErrorMode) Copyright Joe Security LLC 2020 Page 6 of 66 Malware Analysis System Evasion: Contains long sleeps (>= 3 min) May sleep (evasive loops) to hinder dynamic analysis Anti Debugging: Creates guard pages, often used to prevent reverse engineering and debugging HIPS / PFW / Operating System Protection Evasion: Creates a process in suspended mode (likely to inject code) Language, Device and Operating System Detection: Queries the cryptographic machine GUID Malware Configuration No configs have been found Behavior Graph Hide Legend Legend: Process Signature Behavior Graph Created File ID: 228893 DNS/IP Info Sample: imageio-2.8.0-py3-none-any.whl Is Dropped Startdate: 11/05/2020 Architecture: WINDOWS Is Windows Process Score: 2 Number of created Registry Values started Number of created Files unarchiver.exe Visual Basic Delphi 5 Java .Net C# or VB.NET started C, C++ or other language 7za.exe Is malicious Internet 63 dropped dropped dropped dropped C:\Users\user\AppData\Local\...\testing.py, Python C:\Users\user\AppData\Local\...\tifffile.py, Python C:\Users\user\AppData\Local\Temp\...\swf.py, Python 33 other files (none is malicious) started conhost.exe Copyright Joe Security LLC 2020 Page 7 of 66 Simulations Behavior and APIs No simulations Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link imageio-2.8.0-py3-none-any.zip 0% Virustotal Browse Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link www.digitalpreservation.gov/formats/content/tiff_tags.shtml 0% Virustotal Browse www.digitalpreservation.gov/formats/content/tiff_tags.shtml 0% Avira URL Cloud safe bsdf.io 0% Virustotal Browse bsdf.io 0% Avira URL Cloud safe cellcognition.org/ 0% Virustotal Browse cellcognition.org/ 0% Avira URL Cloud safe www.cipa.jp/std/documents/e/DC-008-Translation-2016-E.pdf 0% Virustotal Browse www.cipa.jp/std/documents/e/DC-008-Translation-2016-E.pdf 0% Avira URL Cloud safe https://raw.githubusercontent.com/python-pillow/Pillow/master/docs/handbook/image-file- 0% Avira URL Cloud safe formats.rst www.micro-manager.org/wiki/Micro-Manager_File_Formats 0% Avira URL Cloud safe www.bioimagexd.net/ 0% Virustotal Browse www.bioimagexd.net/ 0% Avira URL Cloud safe www.awaresystems.be/imaging/tiff/faq.html 0% Virustotal Browse www.awaresystems.be/imaging/tiff/faq.html 0% Avira URL Cloud safe www.openmicroscopy.org/site/support/file-formats/ome-tiff 0% Avira URL Cloud safe www.dicomlibrary.com/dicom/transfer-syntax/ 0% Virustotal Browse www.dicomlibrary.com/dicom/transfer-syntax/ 0% Avira URL Cloud safe dgd.vision/Tools/LFToolbox/) 0% Avira URL Cloud safe imageio.github.io 0% Virustotal Browse imageio.github.io 0% Avira URL Cloud safe scanimage.vidriotechnologies.com/display/SI2016/ 0% Avira URL Cloud safe bsdf.io. 0% Virustotal Browse bsdf.io. 0% Avira URL Cloud safe www.ultralum.com/images%20ultralum/pdf/UQStart%20Up%20Guide.pdf 0% Avira URL Cloud safe Yara Overview Initial Sample No yara matches Copyright Joe Security LLC 2020 Page 8 of 66 PCAP (Network Traffic) No yara matches Dropped Files No yara matches Memory Dumps No yara matches Unpacked PEs No yara matches Sigma Overview No Sigma rule has matched Joe Sandbox View / Context IPs No context Domains No context ASN No context JA3 Fingerprints No context Dropped Files No context Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright Joe Security LLC 2020 Page 9 of 66 Startup System is w10x64 unarchiver.exe (PID: 3980 cmdline: 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\Desktop\imageio-2.8.0-py3-none-any.zip'
Recommended publications
  • Other Departments and Institutes Courses 1
    Other Departments and Institutes Courses 1 Other Departments and Institutes Courses About Course Numbers: 02-250 Introduction to Computational Biology Each Carnegie Mellon course number begins with a two-digit prefix that Spring: 12 units designates the department offering the course (i.e., 76-xxx courses are This class provides a general introduction to computational tools for biology. offered by the Department of English). Although each department maintains The course is divided into two halves. The first half covers computational its own course numbering practices, typically, the first digit after the prefix molecular biology and genomics. It examines important sources of biological indicates the class level: xx-1xx courses are freshmen-level, xx-2xx courses data, how they are archived and made available to researchers, and what are sophomore level, etc. Depending on the department, xx-6xx courses computational tools are available to use them effectively in research. may be either undergraduate senior-level or graduate-level, and xx-7xx In the process, it covers basic concepts in statistics, mathematics, and courses and higher are graduate-level. Consult the Schedule of Classes computer science needed to effectively use these resources and understand (https://enr-apps.as.cmu.edu/open/SOC/SOCServlet/) each semester for their results. Specific topics covered include sequence data, searching course offerings and for any necessary pre-requisites or co-requisites. and alignment, structural data, genome sequencing, genome analysis, genetic variation, gene and protein expression, and biological networks and pathways. The second half covers computational cell biology, including biological modeling and image analysis. It includes homework requiring Computational Biology Courses modification of scripts to perform computational analyses.
    [Show full text]
  • Analysis of Cell-Based Rnai Screens Comment Michael Boutros*, Lígia P Brás†‡ and Wolfgang Huber†
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Springer - Publisher Connector Open Access Software2006BoutrosetVolume al. 7, Issue 7, Article R66 Analysis of cell-based RNAi screens comment Michael Boutros*, Lígia P Brás†‡ and Wolfgang Huber† Addresses: *Signaling and Functional Genomics, German Cancer Research Center, Im Neuenheimer Feld 580, 69120 Heidelberg, Germany. †EMBL - European Bioinformatics Institute, Cambridge CB10 1SD, UK. ‡Centre for Chemical and Biological Engineering, IST, Technical University of Lisbon, Av. Rovisco Pais, P-1049-001 Lisbon, Portugal. Correspondence: Michael Boutros. Email: [email protected]. Wolfgang Huber. Email: [email protected] reviews Published: 25 July 2006 Received: 27 March 2006 Revised: 7 June 2006 Genome Biology 2006, 7:R66 (doi:10.1186/gb-2006-7-7-r66) Accepted: 25 July 2006 The electronic version of this article is the complete one and can be found online at http://genomebiology.com/2006/7/7/R66 © 2006 Boutros et al.; licensee BioMed Central Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. reports Analysis<p>cellHTS of cell-based is a new method RNAi screens for the analysis and documentation of RNAi screens.</p> Abstract RNA interference (RNAi) screening is a powerful technology for functional characterization of deposited research biological pathways. Interpretation of RNAi screens requires computational and statistical analysis techniques. We describe a method that integrates all steps to generate a scored phenotype list from raw data.
    [Show full text]
  • Simpleitk Tutorial Image Processing for Mere Mortals
    SimpleITK Tutorial Image processing for mere mortals Insight Software Consortium Sept 23, 2011 (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 1 / 142 This presentation is copyrighted by The Insight Software Consortium distributed under the Creative Commons by Attribution License 3.0 http://creativecommons.org/licenses/by/3.0 What this Tutorial is about Provide working knowledge of the SimpleITK platform (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 3 / 142 Program Virtual Machines Preparation (10min) Introduction (15min) Basic Tutorials I (45min) Short Break (10min) Basic Tutorials II (45min) Co↵ee Break (30min) Intermediate Tutorials (45min) Short Break (10min) Advanced Topics (40min) Wrap-up (10min) (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 4 / 142 Tutorial Goals Gentle introduction to ITK Introduce SimpleITK Provide hands-on experience Problem solving, not direction following ...but please follow directions! (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 13 / 142 ITK Overview How many are familiar with ITK? (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 14 / 142 Ever seen code like this? 1 // Setup image types. 2 typedef float InputPixelType ; 3 typedef float OutputPixelType ; 4 typedef itk ::Image<InputPixelType ,2> InputImageType ; 5 typedef itk ::Image<OutputPixelType,2> OutputImageType ; 6 // Filter type 7 typedef itk ::DiscreteGaussianImageFilter< 8 InputImageType , OutputImageType > 9 FilterType ; 10 // Create a filter 11 FilterType ::Pointer filter = FilterType ::New (); 12 // Create the pipeline 13 filter >SetInput( reader >GetOutput () ); 14 filter−>SetVariance(1.0);− 15 filter−>SetMaximumKernelWidth(5); 16 filter−>Update (); 17 OutputImageType− ::Pointer blurred = filter >GetOutput (); − (Insight Software Consortium) SimpleITK - MICCAI 2011 Sept 2011 15 / 142 We are here to tell you that you can..
    [Show full text]
  • Annexes : Installation Du Logiciel R Et Des Packages R
    Annexes : Installation du logiciel R et des packages R Pr´e-requis et objectif • Aucun pr´e-requis n’est n´ecessaire.La lecture du chapitre 1 pourrait tou- tefois se r´ev´eler int´eressante. • Ce chapitre d´ecritcomment installer le logiciel R, dans sa version x (rem- placer partout dans le reste de ce document x par le num´ero de la derni`ere version disponible), sous le syst`emed’exploitation Microsoft Windows et aussi comment ajouter des packages suppl´ementaires sous Windows ou sous Linux. SECTION C.1 Installation de R sous Microsoft Windows Commencez par t´el´echarger le logiciel R (fichier R-x-win.exe o`u x est le nu- m´ero de la derni`ereversion disponible) `a l’aide de votre navigateur web usuel `a l’adresse suivante : http://cran.r-project.org/bin/windows/base/ Enregistrez ensuite ce fichier ex´ecutable sur le bureau de Windows puis double- cliquez sur le fichier R-x-win.exe dont voici l’icˆone : . Le logiciel s’installe alors et vous n’avez plus qu’`a suivre les instructions qui s’affichent et `a conserver les options propos´ees par d´efaut. Lorsque l’icˆone est ajout´ee sur le bureau, l’installation peut ˆetre consi- d´er´ee comme termin´ee. 574 Le logiciel R SECTION C.2 Installation de packages suppl´ementaires De nombreux modules (packages ou librairies) suppl´ementaires sont dispo- nibles sur le site internet : http://cran.r-project.org/web/packages/available_packages_by_name. html, ou bien encore ici : http://cran.r-project.org/bin/windows/contrib/, dans le dossier corres- pondant au num´ero x de votre version de R.
    [Show full text]
  • December 2016, Volume 34 No.2
    ISSN 0735-1348 Department of Physics, East Carolina University, 1000 East 5th Street, Greenville, NC 27858, USA http://www.ecu.edu/cs-cas/physics/ancient-timeline/ December 2016, Volume 34 No.2 IRSL dating of fast-fading sanidine feldspars from Sulawesi, Indonesia 1 Bo Li, Richard G. Roberts, Adam Brumm, Yu-Jie Guo, Budianto Hakim, Muhammad Ramli, Maxime Aubert, Rainer Grün, Jian-xin Zhao, E. Wahyu Saptomo Bayesian statistics in luminescence dating: The ‘baSAR’-model and its 14 implementation in the R package ‘Luminescence’ Norbert Mercier, Sebastian Kreutzer, Claire Christophe, Guillaume Guérin, Pierre Guibert, Christelle Lahaye, Philippe Lanos, Anne Philippe, and Chantal Tribolo RLumShiny - A graphical user interface for the R Package ‘Luminescence’ 22 Christoph Burow, Sebastian Kreutzer, Michael Dietze, Margret C. Fuchs, Manfred Fischer, Christoph Schmidt, Helmut Brückner Thesis abstracts 33 Bibliography 36 Ancient TL Started by the late David Zimmerman in 1977 EDITOR Regina DeWitt, Department of Physics, East Carolina University, Howell Science Complex, 1000 E. 5th Street Greenville, NC 27858, USA; Tel: +252-328-4980; Fax: +252-328-0753 ([email protected]) EDITORIAL BOARD Ian K. Bailiff, Luminescence Dating Laboratory, Univ. of Durham, Durham, UK ([email protected]) Geoff A.T. Duller, Institute of Geography and Earth Sciences, Aberystwyth University, Ceredigion, Wales, UK ([email protected]) Sheng-Hua Li, Department of Earth Sciences, The University of Hong Kong, Hong Kong, China ([email protected]) Shannon Mahan, U.S. Geological Survey, Denver Federal Center, Denver, CO, USA ([email protected]) Richard G. Roberts, School of Earth and Environmental Sciences, University of Wollongong, Australia ([email protected]) REVIEWERS PANEL Richard M.
    [Show full text]
  • MRI-Based Radiomics Analysis for the Pretreatment Prediction Of
    cancers Article MRI-Based Radiomics Analysis for the Pretreatment Prediction of Pathologic Complete Tumor Response to Neoadjuvant Systemic Therapy in Breast Cancer Patients: A Multicenter Study Renée W. Y. Granzier 1,2,* , Abdalla Ibrahim 2,3,4,5,6,† , Sergey P. Primakov 2,4,†, Sanaz Samiei 1,2,3, Thiemo J. A. van Nijnatten 3 , Maaike de Boer 2,7, Esther M. Heuts 1 , Frans-Jan Hulsmans 8, Avishek Chatterjee 2,4 , Philippe Lambin 2,3,4 , Marc B. I. Lobbes 2,3,8 , Henry C. Woodruff 2,3,4,‡ and Marjolein L. Smidt 1,3,‡ 1 Department of Surgery, Maastricht University Medical Center+, P.O. Box 5800, 6202 AZ Maastricht, The Netherlands; [email protected] (S.S.); [email protected] (E.M.H.); [email protected] (M.L.S.) 2 GROW-School for Oncology and Developmental Biology, Maastricht University, P.O. Box 616, 6200 MD Maastricht, The Netherlands; [email protected] (A.I.); Citation: Granzier, R.W.Y.; Ibrahim, [email protected] (S.P.P.); [email protected] (M.d.B.); A.; Primakov, S.P.; Samiei, S.; van [email protected] (A.C.); [email protected] (P.L.); Nijnatten, T.J.A.; de Boer, M.; Heuts, [email protected] (M.B.I.L.); [email protected] (H.C.W.) 3 E.M.; Hulsmans, F.-J.; Chatterjee, A.; Department of Radiology and Nuclear Medicine, Maastricht University Medical Center+, P.O. Box 5800, Lambin, P.; et al. MRI-Based 6202 AZ Maastricht, The Netherlands; [email protected] 4 The D-Lab, Department of Precision Medicine, Maastricht University, Universiteitssingel
    [Show full text]
  • Raluca-Maria Sandu RESEARCHER · DATA Scientist  [email protected] |  Rmsandu.Github.Io |  Rmsandu |  Rmsandu
    Raluca-Maria Sandu RESEARCHER · DATA SCiENTiST [email protected] | rmsandu.github.io | rmsandu | rmsandu About Me I am a perseverant and resourceful scientific professional who just finished their PhD Degree in Biomedical Engineering at the University of Bern, previously having graduated with an MSc in the same field, and a BSc in Control Engineering and Applied Computer Science. I am specialized in working on data science and research & development projects across various topics as evidenced by my work experience and studies. Work Experience University of Bern, ARTORG Center for Biomedical Engineering Research Bern, Switzerland DOCTORAL CANDiDATE (PHD) May 2017 ‑ Feb. 2021 • Worked with data mining, image processing & registration, radiomics & feature extraction, statistics, and machine learning algorithms in the area of CT‑guided ablation treatments for liver cancer by using Python and R programming languages. • Developed a quantitative and numerical evaluation method based on DICOM image segmentations for assessing the success of liver ablation treatments which was published in a peer‑reviewed journal. More info here. Philips Research, Personal Care and Wellness Eindhoven, The Netherlands RESEARCH AND DEVELOPMENT GRADUATE STUDENT Jul. 2016 ‑ Mar. 2017 • Designed and developed a web‑based application for image annotation using JavaScript, HTML and CSS that can be found here. • Applied image processing and machine learning algorithms in Python (SVM, PCA, Random Forests) for classification of skin surface structures. Philips Research, Personal Care and Wellness Eindhoven, The Netherlands RESEARCH AND DEVELOPMENT INTERNSHiP Apr. 2016 ‑ Jun. 2016 • Contributed with exploratory 2D image analysis in Python to quantify the effect of various diets on physical appearance at skin surface.
    [Show full text]
  • GNC Khan-Academy Una Estrategia.Pdf
    Revista de Pedagogía ESCUELA DE EDUCACIÓN FACULTAD DE HUMANIDADES Y EDUCACIÓN UNIVERSIDAD CENTRAL DE VENEZUELA Depósito Legal pp. 197102DF193 ISSN N° 0798-9792 Caracas, julio-diciembre 2018, vol. 39, nº 105 Publicación semestral Director-Editor Ramón Alexander Uzcátegui Pacheco (Universidad Central de Venezuela) Consejo Editor Ángel Alvarado (Universidad Central de Venezuela) Doris Villaroel (Universidad Central de Venezuela) María Janet Ríos (Universidad Central de Venezuela) Mariángeles Payer (Universidad Central de Venezuela) Rosa Leonor Junguittu (Universidad Central de Venezuela) Eduardo Cavieres Fernández (Universidad de Playa Ancha, Chile) Maria Helena Michels (Universidade Federal de Santa Catarina, Brasil) Versión electrónica de la Revista Saber UCV, Redalyc, Revencyt y Scopus Consejo Asesor Carlos Eduardo Blanco (Universidad Central de Venezuela) Luis Bravo Jáuregui (Universidad Central de Venezuela) Aurora Lacueva (Universidad Central de Venezuela) Nacarid Rodríguez (Universidad Central de Venezuela) Juan Haro (Universidad Central de Venezuela) Alexandra Mulino (Universidad Central de Venezuela) Traducciones y Correcciones Gabriela Delgado Montoya Mariel Escuela de Educación - UCV Apoyo Secretarial y Logístico Luzmelys Martínez Judith Solórzano Consejo Asesor Honorario Internacional Martha Aguirre, Universidad Católica Boliviana “Santa Cruz” Ana Lupita Chaves Salas, Universidad de Costa Rica Carlos Miñana Blasco, Universidad Nacional de Colombia Ángel Pérez Gómez, Universidad de Málaga César Coll, Universidad de Barcelona Fernando
    [Show full text]
  • Implementing the DICOM Standard for Digital Pathology
    [Downloaded free from http://www.jpathinformatics.org on Tuesday, May 7, 2019, IP: 4.16.85.218] Original Article Implementing the DICOM Standard for Digital Pathology Markus D. Herrmann1, David A. Clunie2, Andriy Fedorov3,4, Sean W. Doyle1, Steven Pieper5, Veronica Klepeis4,6, Long P. Le4,6, George L. Mutter4,7, David S. Milstone4,7, Thomas J. Schultz8, Ron Kikinis3,4, Gopal K. Kotecha1, David H. Hwang4,7, Katherine P. Andriole1,4,9, A. John Iafrate4,6, James A. Brink4,10, Giles W. Boland4,9, Keith J. Dreyer1,4,10, Mark Michalski1,4,10, Jeffrey A. Golden4,7, David N. Louis4,6, Jochen K. Lennerz4,6 1MGH and BWH Center for Clinical Data Science, 3Department of Radiology, Surgical Planning Laboratory, Brigham and Women’s Hospital, 4Harvard Medical School, Departments of 6Pathology and 10Radiology, Massachusetts General Hospital, Departments of 7Pathology and 9Radiology, Brigham and Women’s Hospital, 8Enterprise Medical Imaging, Massachusetts General Hospital, Boston, MA, 5Isomics, Inc., Cambridge, MA, USA, 2PixelMed Publishing, LLC, Bangor, PA, USA Received: 30 July 2018 Accepted: 06 August 2018 Published: 02 November 2018 Abstract Background: Digital Imaging and Communications in Medicine (DICOM®) is the standard for the representation, storage, and communication of medical images and related information. A DICOM file format and communication protocol for pathology have been defined; however, adoption by vendors and in the field is pending. Here, we implemented the essential aspects of the standard and assessed its capabilities and limitations in a multisite, multivendor healthcare network. Methods: We selected relevant DICOM attributes, developed a program that extracts pixel data and pixel-related metadata, integrated patient and specimen-related metadata, populated and encoded DICOM attributes, and stored DICOM files.
    [Show full text]
  • Bioconductor Annual Report 2011
    Bioconductor Annual Report 2011 Martin Morgan Fred Hutchinson Cancer Research Center July 2011 Contents 1 Project Scope1 1.1 Packages................................1 1.2 Courses and Conferences.......................2 1.3 Community..............................3 1.4 Publication..............................3 1.5 Funding................................4 2 Core Tasks & Capabilities5 2.1 Automated Package Building and Testing.............5 2.2 Package submission management..................5 2.3 Annotation data package building..................6 2.4 Other Tasks..............................6 2.5 Hardware...............................6 2.6 Key Personnel.............................6 A Appendix: Proposal Specific Aims 11 1 Project Scope Bioconductor provides access to software for the analysis and comprehension of high throughput genomic data. Packages are written in the R programming lan- guage by members of the Bioconductor team and the international community. Bioconductor was started approximately 10 years ago (Fall, 2001) by Dr. Robert Gentleman and others, and now consists of >460 packages for the analysis of data ranging from expression microarrays through next-generation sequencing. 1.1 Packages R software packages represent the primary product of the Bioconductor project. Packages are produced by the Bioconductor team or are from international con- tributors. Table1 summarizes growth in the number of packages hosted by 1 Table 1: Number of contributed packages included in each Bioconductor release. Releases occur twice per year. Release N Release N Release N 2002 1.0 15 2006 1.8 172 2010 2.6 389 1.1 20 1.9 188 2.7 419 2003 1.2 30 2007 2.0 214 2011 2.8 467 1.3 49 2.1 233 2004 1.4 81 2008 2.2 260 1.5 100 2.3 294 2005 1.6 123 2009 2.4 320 1.7 141 2.5 352 Bioconductor, with 467 packages available in the current release.
    [Show full text]
  • Virtual Communities for Parents of Children with Special Needs in Taiwan: Emotional Support, Information, and Advocacy
    Virtual communities for parents of children with special needs in Taiwan: Emotional support, information, and advocacy A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2017 I-Jung, Lu Manchester Institute of Education School of Environment, Education and Development List of Contents LIST OF CONTENTS ................................................................................................. 1 LIST OF TABLES ....................................................................................................... 6 LIST OF FIGURES ..................................................................................................... 7 ABSTRACT .................................................................................................................. 8 DECLARATION.......................................................................................................... 9 COPYRIGHT STATEMENT ..................................................................................... 9 ACKNOWLEDGEMENT ......................................................................................... 10 GLOSSARY................................................................................................................ 11 CHAPTER 1. INTRODUCTION ............................................................................. 14 1.1 Parents in the virtual world ................................................................... 14 1.2 Support for parents ..................................................................................
    [Show full text]
  • 3D Slicer Documentation
    3D Slicer Documentation Slicer Community Sep 25, 2021 CONTENTS 1 About 3D Slicer 3 1.1 What is 3D Slicer?............................................3 1.2 License..................................................4 1.3 How to cite................................................5 1.4 Acknowledgments............................................7 1.5 Commercial Use.............................................8 1.6 Contact us................................................9 2 Getting Started 11 2.1 System requirements........................................... 11 2.2 Installing 3D Slicer............................................ 12 2.3 Using Slicer............................................... 14 2.4 Glossary................................................. 19 3 Get Help 23 3.1 I need help in using Slicer........................................ 23 3.2 I want to report a problem........................................ 23 3.3 I would like to request enhancement or new feature........................... 24 3.4 I would like to let the Slicer community know, how Slicer helped me in my research......... 24 3.5 Troubleshooting............................................. 24 4 User Interface 27 4.1 Application overview........................................... 27 4.2 Review loaded data............................................ 29 4.3 Interacting with views.......................................... 31 4.4 Mouse & Keyboard Shortcuts...................................... 35 5 Data Loading and Saving 37 5.1 DICOM data..............................................
    [Show full text]