File name:

Digital_Viewer.exe

Full analysis: https://app.any.run/tasks/2284ec5f-d402-4b70-b93c-a49827888cd3
Verdict: Malicious activity
Analysis date: May 15, 2025, 12:03:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

821B37E3F8A9DDB36FF21026651A467B

SHA1:

FC0BE6EC62ACE14332E711BD6BBB57D083201338

SHA256:

32D2967C69D4115BC196AFB6ADE22FA45EC6C49B0CC705265F3DFEF3FFF357CC

SSDEEP:

196608:rIC/C6oEHVQNbvshf0cDVZSSSbr46pEORI+tJEiVPsIypRBEb6c2:rICArNba8cCDbU6pdR7HGHEv2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Digital_Viewer.exe (PID: 5968)
      • Digital_Viewer.exe (PID: 5072)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 1164)
      • rundll32.exe (PID: 1128)
    • Registers / Runs the DLL via REGSVR32.EXE

      • Xvid-1.3.3-20141019.exe (PID: 6192)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
      • rundll32.exe (PID: 1164)
      • rundll32.exe (PID: 1128)
    • There is functionality for taking screenshot (YARA)

      • Digital_Viewer.exe (PID: 5072)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2852)
      • regsvr32.exe (PID: 6436)
    • Uses RUNDLL32.EXE to load library

      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Creates a software uninstall entry

      • Xvid-1.3.3-20141019.exe (PID: 6192)
      • Digital_Viewer.exe (PID: 5072)
  • INFO

    • Checks supported languages

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
      • setavi32.exe (PID: 1812)
      • setavi64.exe (PID: 5352)
    • Create files in a temporary directory

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Reads the computer name

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Creates files in the program directory

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • The sample compiled with english language support

      • Digital_Viewer.exe (PID: 5072)
      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Reads CPU info

      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Process checks whether UAC notifications are on

      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Reads the time zone

      • Xvid-1.3.3-20141019.exe (PID: 6192)
      • runonce.exe (PID: 6480)
      • runonce.exe (PID: 5776)
    • The sample compiled with german language support

      • Xvid-1.3.3-20141019.exe (PID: 6192)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 6480)
      • runonce.exe (PID: 5776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:52+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 164864
UninitializedDataSize: 1024
EntryPoint: 0x30fa
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
15
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start digital_viewer.exe sppextcomobj.exe no specs slui.exe no specs xvid-1.3.3-20141019.exe rundll32.exe runonce.exe no specs grpconv.exe no specs regsvr32.exe no specs rundll32.exe runonce.exe no specs grpconv.exe no specs regsvr32.exe no specs setavi32.exe no specs setavi64.exe no specs digital_viewer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\Windows\System32\grpconv.exe" -oC:\Windows\SysWOW64\grpconv.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Progman Group Converter
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1128C:\Windows\System32\rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 0 C:\Users\admin\AppData\Local\Temp/xvid_x64/xvid.infC:\Windows\System32\rundll32.exe
Xvid-1.3.3-20141019.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
1164C:\Windows\System32\rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 0 C:\Users\admin\AppData\Local\Temp/xvid_x86/xvid.infC:\Windows\SysWOW64\rundll32.exe
Xvid-1.3.3-20141019.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1812C:\Users\admin\AppData\Local\Temp\xvid_x86\setavi32.exeC:\Users\admin\AppData\Local\Temp\xvid_x86\setavi32.exeXvid-1.3.3-20141019.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\xvid_x86\setavi32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2100"C:\Windows\System32\grpconv.exe" -oC:\Windows\System32\grpconv.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Progman Group Converter
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2852C:\Windows\System32\regsvr32.exe /s C:\WINDOWS\system32/xvid.axC:\Windows\SysWOW64\regsvr32.exeXvid-1.3.3-20141019.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4220"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
4812C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
5072"C:\Users\admin\AppData\Local\Temp\Digital_Viewer.exe" C:\Users\admin\AppData\Local\Temp\Digital_Viewer.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\digital_viewer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5352C:\Users\admin\AppData\Local\Temp\xvid_x64\setavi64.exeC:\Users\admin\AppData\Local\Temp\xvid_x64\setavi64.exeXvid-1.3.3-20141019.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\xvid_x64\setavi64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
2 020
Read events
1 903
Write events
88
Delete events
29

Modification events

(PID) Process:(1164) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\drivers.desc
Operation:writeName:xvidvfw.dll
Value:
Xvid MPEG-4 Video Codec
(PID) Process:(1164) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32
Operation:writeName:vidc.XVID
Value:
xvidvfw.dll
(PID) Process:(1164) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:GrpConv
Value:
grpconv -o
(PID) Process:(6480) runonce.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A78039010000FB9A790967ADD111ABCD00C04FC30936CB000000
(PID) Process:(6480) runonce.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:GrpConv
Value:
grpconv -o
(PID) Process:(2852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\MediaFoundation\Transforms\64697678-0000-0010-8000-00aa00389b71
Operation:writeName:InputTypes
Value:
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
(PID) Process:(2852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\MediaFoundation\Transforms\64697678-0000-0010-8000-00aa00389b71
Operation:writeName:OutputTypes
Value:
7669647300001000800000AA00389B7100000000000000000000000000000000
(PID) Process:(2852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64697678-0000-0010-8000-00AA00389B71}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(2852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000001-4FEF-40D3-B3FA-E0531B897F98}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(2852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{64697678-0000-0010-8000-00AA00389B71}
Operation:writeName:FriendlyName
Value:
Xvid MPEG-4 Video Decoder
Executable files
49
Suspicious files
27
Text files
23
Unknown types
1

Dropped files

PID
Process
Filename
Type
5072Digital_Viewer.exeC:\Users\admin\AppData\Local\Temp\nscD583.tmp\UserInfo.dllexecutable
MD5:7579ADE7AE1747A31960A228CE02E666
SHA256:564C80DEC62D76C53497C40094DB360FF8A36E0DC1BDA8383D0F9583138997F5
6192Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BRF84D.tmpexecutable
MD5:08AD4CD2A940379F1DCDBDB9884A1375
SHA256:78827E2B1EF0AAD4F8B1B42D0964064819AA22BFCD537EBAACB30D817EDC06D8
6192Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BRF791.tmpexecutable
MD5:98E531FFD84600DD27E8BC4A83DCDD5E
SHA256:09DD23B63F9FE79D039E43F274B5AEB9DF01A816DEFC8C503531E1B3643921A3
5072Digital_Viewer.exeC:\Program Files (x86)\Plugable Technologies\Plugable Digital Viewer\Xvid-1.3.3-20141019.exeexecutable
MD5:542BB1E4393255C16F03583727320812
SHA256:23ACF6354A07C28DF537144BF9290586C4A9FFB3A373142CC5FC66D3BE9AF39D
5072Digital_Viewer.exeC:\Xvid-1.3.3-20141019.exeexecutable
MD5:542BB1E4393255C16F03583727320812
SHA256:23ACF6354A07C28DF537144BF9290586C4A9FFB3A373142CC5FC66D3BE9AF39D
6192Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\xvid.icoimage
MD5:231017665B6869CB6762B09E15F1A8ED
SHA256:B5735768B9E283578094EF05A2FEEC921BDCF5230B662D0F21956470D190DC0E
6192Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\releasenotes.txttext
MD5:1E5E0140E56BA915807CD22D876C9BC6
SHA256:1CFBBDB62212D52DED66CC231FC3ECDCF062A9AA45CF50FCE95E94D0323FBBF8
6192Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR2A3.tmpexecutable
MD5:FA89B48BF972FEF2F26C24A5C1BD1689
SHA256:6E5348CBCE980777D8E9827B57A90BE829F94884C9F96395807BABDB9B445756
6192Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\MiniCalc.exeexecutable
MD5:7CE40A557359849EA374E0E4DDE52E26
SHA256:258CE8775A3327A572A2958FCAE778D4C0550F01EC28A5CC406ED396F2634BC5
6192Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\MiniConvert.exeexecutable
MD5:A40C3DB74E5FE589863DCB9158962DEE
SHA256:69865C71A865E4E4CDA721D7CF22D6E792137643125437D2E3BE4DA8FB52B849
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5164
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5164
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5164
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.128
  • 20.190.160.17
  • 20.190.160.67
  • 20.190.160.14
  • 20.190.160.132
  • 20.190.160.3
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

No threats detected
No debug info