File name:

Digital_Viewer_3.1.07.exe

Full analysis: https://app.any.run/tasks/444667d4-ab85-4594-924c-dc5c0315c4f9
Verdict: Malicious activity
Analysis date: June 23, 2025, 11:13:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

821B37E3F8A9DDB36FF21026651A467B

SHA1:

FC0BE6EC62ACE14332E711BD6BBB57D083201338

SHA256:

32D2967C69D4115BC196AFB6ADE22FA45EC6C49B0CC705265F3DFEF3FFF357CC

SSDEEP:

196608:rIC/C6oEHVQNbvshf0cDVZSSSbr46pEORI+tJEiVPsIypRBEb6c2:rICArNba8cCDbU6pdR7HGHEv2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Digital_Viewer_3.1.07.exe (PID: 3656)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 4944)
      • rundll32.exe (PID: 6620)
    • Registers / Runs the DLL via REGSVR32.EXE

      • Xvid-1.3.3-20141019.exe (PID: 2628)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Xvid-1.3.3-20141019.exe (PID: 2628)
      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • rundll32.exe (PID: 6620)
      • rundll32.exe (PID: 4944)
    • There is functionality for taking screenshot (YARA)

      • Digital_Viewer_3.1.07.exe (PID: 2952)
    • Uses RUNDLL32.EXE to load library

      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 1160)
      • regsvr32.exe (PID: 2428)
    • Creates a software uninstall entry

      • Xvid-1.3.3-20141019.exe (PID: 2628)
      • Digital_Viewer_3.1.07.exe (PID: 2952)
  • INFO

    • Create files in a temporary directory

      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Launching a file from a Registry key

      • rundll32.exe (PID: 4944)
      • rundll32.exe (PID: 6620)
    • Checks supported languages

      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
      • setavi64.exe (PID: 4816)
      • setavi32.exe (PID: 1352)
    • Creates files in the program directory

      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Reads the computer name

      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • The sample compiled with english language support

      • Digital_Viewer_3.1.07.exe (PID: 2952)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Process checks whether UAC notifications are on

      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Reads CPU info

      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • The sample compiled with german language support

      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Reads the time zone

      • runonce.exe (PID: 2220)
      • runonce.exe (PID: 5456)
      • Xvid-1.3.3-20141019.exe (PID: 2628)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 2220)
      • runonce.exe (PID: 5456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:52+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 164864
UninitializedDataSize: 1024
EntryPoint: 0x30fa
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
14
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start digital_viewer_3.1.07.exe xvid-1.3.3-20141019.exe rundll32.exe runonce.exe no specs grpconv.exe no specs regsvr32.exe no specs rundll32.exe runonce.exe no specs grpconv.exe no specs regsvr32.exe no specs setavi32.exe setavi64.exe slui.exe no specs digital_viewer_3.1.07.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1096"C:\Windows\System32\grpconv.exe" -oC:\Windows\System32\grpconv.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Progman Group Converter
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1160C:\Windows\System32\regsvr32.exe /s C:\WINDOWS\system32/xvid.axC:\Windows\SysWOW64\regsvr32.exeXvid-1.3.3-20141019.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1352C:\Users\admin\AppData\Local\Temp\xvid_x86\setavi32.exeC:\Users\admin\AppData\Local\Temp\xvid_x86\setavi32.exe
Xvid-1.3.3-20141019.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\xvid_x86\setavi32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2220"C:\WINDOWS\system32\runonce.exe" -rC:\Windows\SysWOW64\runonce.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\runonce.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2428C:\Windows\System32\regsvr32.exe /s C:\WINDOWS/system32/xvid.axC:\Windows\System32\regsvr32.exeXvid-1.3.3-20141019.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2628"C:\Program Files (x86)\Plugable Technologies\Plugable Digital Viewer\Xvid-1.3.3-20141019.exe" --mode unattended --AutoUpdater no --unattendedmodeui none --decode_divx no --decode_3ivx no --decode_other noC:\Program Files (x86)\Plugable Technologies\Plugable Digital Viewer\Xvid-1.3.3-20141019.exe
Digital_Viewer_3.1.07.exe
User:
admin
Company:
Xvid Team
Integrity Level:
HIGH
Exit code:
0
Version:
1.3.3.0
Modules
Images
c:\program files (x86)\plugable technologies\plugable digital viewer\xvid-1.3.3-20141019.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2952"C:\Users\admin\AppData\Local\Temp\Digital_Viewer_3.1.07.exe" C:\Users\admin\AppData\Local\Temp\Digital_Viewer_3.1.07.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\digital_viewer_3.1.07.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3656"C:\Users\admin\AppData\Local\Temp\Digital_Viewer_3.1.07.exe" C:\Users\admin\AppData\Local\Temp\Digital_Viewer_3.1.07.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\digital_viewer_3.1.07.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4684C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4816C:\Users\admin\AppData\Local\Temp\xvid_x64\setavi64.exeC:\Users\admin\AppData\Local\Temp\xvid_x64\setavi64.exe
Xvid-1.3.3-20141019.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\xvid_x64\setavi64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
2 227
Read events
2 113
Write events
85
Delete events
29

Modification events

(PID) Process:(4944) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\drivers.desc
Operation:writeName:xvidvfw.dll
Value:
Xvid MPEG-4 Video Codec
(PID) Process:(4944) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32
Operation:writeName:vidc.XVID
Value:
xvidvfw.dll
(PID) Process:(4944) rundll32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:GrpConv
Value:
grpconv -o
(PID) Process:(2220) runonce.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:GrpConv
Value:
grpconv -o
(PID) Process:(2220) runonce.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2628) Xvid-1.3.3-20141019.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32
Operation:writeName:msacm.l3acm
Value:
l3codecp.acm
(PID) Process:(2628) Xvid-1.3.3-20141019.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\drivers.desc
Operation:writeName:l3codecp.acm
Value:
Fraunhofer IIS MPEG Layer-3 Codec (professional)
(PID) Process:(2628) Xvid-1.3.3-20141019.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\drivers.desc
Operation:delete valueName:l3codeca.acm
Value:
(PID) Process:(2628) Xvid-1.3.3-20141019.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\msacm\msacm.l3acm
Operation:writeName:Driver
Value:
l3codecp.acm
(PID) Process:(1160) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\MediaFoundation\Transforms\64697678-0000-0010-8000-00aa00389b71
Operation:writeName:InputTypes
Value:
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
Executable files
48
Suspicious files
11
Text files
24
Unknown types
17

Dropped files

PID
Process
Filename
Type
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR70EE.tmpexecutable
MD5:72FAB2C90296330ECA3787DC4093E208
SHA256:6251F51D616CDCB4256D73A67819A3419E5B59158BE358CF387B90E39C05C260
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR7001.tmpexecutable
MD5:08AD4CD2A940379F1DCDBDB9884A1375
SHA256:78827E2B1EF0AAD4F8B1B42D0964064819AA22BFCD537EBAACB30D817EDC06D8
2952Digital_Viewer_3.1.07.exeC:\Xvid-1.3.3-20141019.exeexecutable
MD5:542BB1E4393255C16F03583727320812
SHA256:23ACF6354A07C28DF537144BF9290586C4A9FFB3A373142CC5FC66D3BE9AF39D
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR7011.tmpexecutable
MD5:D33EE6D856350F321189138134745388
SHA256:9EB5405449BE0D43FEE145B5B6D5FE01799C6F635389A44F58A0AF2793A1B737
2952Digital_Viewer_3.1.07.exeC:\Program Files (x86)\Plugable Technologies\Plugable Digital Viewer\Xvid-1.3.3-20141019.exeexecutable
MD5:542BB1E4393255C16F03583727320812
SHA256:23ACF6354A07C28DF537144BF9290586C4A9FFB3A373142CC5FC66D3BE9AF39D
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\be29e7f1-71ae-4703-50cb-1d52be512f51\twapi-be29e7f1-71ae-4703-50cb-1d52be512f51.dllexecutable
MD5:A210F1AC135E5331C314CE5F394FB5A5
SHA256:65B32EA2982078FB9A18E88FEEC238CB76ED2AE6C2BB4DDB0F6A9C4F57B1D62B
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR737F.tmpexecutable
MD5:B4EB1E7438DC099078CE8FE6E5A2C99D
SHA256:F9AB62A357A9D964CEE9E078EF5C6A66D3AFE9B27C57D01D8B4FE1D7930C630B
2628Xvid-1.3.3-20141019.exeC:\Users\admin\AppData\Local\Temp\BR73AF.tmpexecutable
MD5:FA89B48BF972FEF2F26C24A5C1BD1689
SHA256:6E5348CBCE980777D8E9827B57A90BE829F94884C9F96395807BABDB9B445756
2628Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\MiniConvert.exeexecutable
MD5:A40C3DB74E5FE589863DCB9158962DEE
SHA256:69865C71A865E4E4CDA721D7CF22D6E792137643125437D2E3BE4DA8FB52B849
2628Xvid-1.3.3-20141019.exeC:\Program Files (x86)\Xvid\xvid.icoimage
MD5:231017665B6869CB6762B09E15F1A8ED
SHA256:B5735768B9E283578094EF05A2FEEC921BDCF5230B662D0F21956470D190DC0E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2292
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.190:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5232
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5232
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5008
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2292
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2292
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.130
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.3
  • 20.190.160.20
  • 40.126.32.68
  • 20.190.160.2
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
crl.microsoft.com
  • 23.55.104.190
  • 23.55.104.172
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.29
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
Process
Message
setavi32.exe
Successfully changed DACL
setavi64.exe
Successfully changed DACL