File name:

Romexis_Viewer_Win.exe

Full analysis: https://app.any.run/tasks/bb84ae2d-8b45-4258-90e8-0372fdf5646d
Verdict: Malicious activity
Analysis date: June 28, 2025, 19:53:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 12 sections
MD5:

2F549E3BC2136D007E65BD32D11C4CBC

SHA1:

93E118FBFE817DD7599855AAFA4A48E76970FA9D

SHA256:

E6C99B4AB79978B751E59F3338D08650DC35416685DA65F1EF53C88A188C4730

SSDEEP:

98304:VWpaXlcuaaU3tFeIO9LkBPqjIsGPObvR03Uv+hMw26WR4jdKeL37NIU6boplHDGo:rIfqG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Romexis_Viewer_Win.exe (PID: 6428)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • The sample compiled with english language support

      • Romexis_Viewer_Win.exe (PID: 6428)
    • Create files in a temporary directory

      • Romexis_Viewer_Win.exe (PID: 6428)
    • Reads the computer name

      • Romexis_Viewer_Win.exe (PID: 6428)
    • Creates files or folders in the user directory

      • Romexis_Viewer_Win.exe (PID: 6428)
    • Checks supported languages

      • Romexis_Viewer_Win.exe (PID: 6428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (47.2)
.exe | Win32 Executable MS Visual C++ (generic) (35.5)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1972:10:31 08:49:44+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.24
CodeSize: 10777600
InitializedDataSize: 16262656
UninitializedDataSize: 37376
EntryPoint: 0x14c0
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.0.0.3
ProductVersionNumber: 6.0.0.3
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Planmeca Oy
FileDescription: Planmeca Romexis Viewer Launcher
FileVersion: 6.0.0.3
InternalName: Planmeca Romexis Viewer Launcher
LegalCopyright: Planmeca Oy
LegalTrademarks1: All Rights Reserved
LegalTrademarks2: All Rights Reserved
OriginalFileName: Romexis_Viewer_Win.exe
ProductName: Planmeca Romexis Viewer Launcher
ProductVersion: 6.0.0.3.R
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start romexis_viewer_win.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1204C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6428"C:\Users\admin\AppData\Local\Temp\Romexis_Viewer_Win.exe" C:\Users\admin\AppData\Local\Temp\Romexis_Viewer_Win.exe
explorer.exe
User:
admin
Company:
Planmeca Oy
Integrity Level:
MEDIUM
Description:
Planmeca Romexis Viewer Launcher
Exit code:
0
Version:
6.0.0.3
Modules
Images
c:\users\admin\appdata\local\temp\romexis_viewer_win.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
263
Read events
263
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6428Romexis_Viewer_Win.exeC:\Users\admin\AppData\Local\Tempviewerlauncher.tmp
MD5:
SHA256:
6428Romexis_Viewer_Win.exeC:\Users\admin\AppData\Local\Temp\ViewerLauncher.logtext
MD5:5ADD3FDE78DE9B9C27AEE1F6618C86BD
SHA256:1B6B37CA8ACA9FED059B99DBF8CEBB69EB1BC99CE301992FBCF8D8B394F64ED8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4700
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4824
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4824
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7152
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4700
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4700
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.32
  • 23.216.77.26
  • 23.216.77.21
  • 23.216.77.28
  • 23.216.77.30
  • 23.216.77.20
  • 23.216.77.19
  • 23.216.77.18
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.64
  • 20.190.160.4
  • 20.190.160.130
  • 20.190.160.20
  • 20.190.160.5
  • 20.190.160.14
  • 20.190.160.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Reading ini file"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Language: "
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: SkipMainScreen: "
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Romexis Viewer version: "
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: CD restrictions disabled: 0"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Ini file not found from C:/Users/admin/AppData/Local/Temp\\data\\\\config.ini"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Searching from old location: C:/Users/admin/AppData/Local/Temp\\config.ini"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Search DICOMDIR form parent folder: 0"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: PatientTableView: Failed to load background image"
Romexis_Viewer_Win.exe
"Sat Jun 28 19:53:43 2025: Initializing Viewer Launcher 6.0.0.3.R (08/26/2019)"