Overview
overview
7Static
static
3RSI-Setup-2.0.0.exe
windows10-2004-x64
$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows10-2004-x64
1RSI Launcher.exe
windows10-2004-x64
5d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...64.exe
windows10-2004-x64
7resources/elevate.exe
windows10-2004-x64
1resources/...rt.exe
windows10-2004-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...er.exe
windows10-2004-x64
4$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$TEMP/VC_r...64.exe
windows10-2004-x64
7$TEMP/dotN...up.exe
windows10-2004-x64
7$TEMP/dxwebsetup.exe
windows10-2004-x64
7Analysis
-
max time kernel
61s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
RSI-Setup-2.0.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
RSI Launcher.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
resources/VC_redist.x64.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
resources/elevate.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
resources/installer-support.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
vulkan-1.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$R0/Uninstall RSI Launcher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
$TEMP/VC_redist.x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral30
Sample
$TEMP/dotNetFx45_Full_setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$TEMP/dxwebsetup.exe
Resource
win10v2004-20240508-en
General
-
Target
RSI Launcher.exe
-
Size
158.5MB
-
MD5
fb745b1faa76fb33d0c7f665835a2613
-
SHA1
5a3ede67f1025e4528b60e557b5df67820ee0efc
-
SHA256
8a0a9690e03d03cf36b78142319c92408fad4c7c01a3d85083ce94f03c545905
-
SHA512
970dbc1b91345096d8abfcfaf5bf7c4d09b8a6ea5a0035338d8fac36b679521d5fa9d7efe977f5bb462a91f3f826bff7d8808c3e7f36ae3924e01e985075c9e0
-
SSDEEP
1572864:Sqlkf5pFz1X7SBT4Oj3tdOS69YvkSpjwy8Oz/jf2xzQf+f5KvAKNtnJHUOWm5v:IcUkHaov
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RSI Launcher.exeRSI Launcher.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation RSI Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation RSI Launcher.exe -
Loads dropped DLL 2 IoCs
Processes:
RSI Launcher.exepid process 1408 RSI Launcher.exe 1408 RSI Launcher.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
RSI Launcher.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: 33 6468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6468 AUDIODG.EXE Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe Token: SeShutdownPrivilege 1408 RSI Launcher.exe Token: SeCreatePagefilePrivilege 1408 RSI Launcher.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
RSI Launcher.exepid process 1408 RSI Launcher.exe 1408 RSI Launcher.exe 1408 RSI Launcher.exe 1408 RSI Launcher.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
RSI Launcher.exepid process 1408 RSI Launcher.exe 1408 RSI Launcher.exe 1408 RSI Launcher.exe 1408 RSI Launcher.exe 1408 RSI Launcher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RSI Launcher.exedescription pid process target process PID 1408 wrote to memory of 1244 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 1244 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3692 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3124 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 3124 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 4972 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 4972 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 4256 1408 RSI Launcher.exe reg.exe PID 1408 wrote to memory of 4256 1408 RSI Launcher.exe reg.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe PID 1408 wrote to memory of 6412 1408 RSI Launcher.exe RSI Launcher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\rsilauncher /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\rsilauncher\Crashpad --url=https://f.a.k/e --annotation=_productName=rsilauncher --annotation=_version=2.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=26.2.1 --initial-client-data=0x458,0x45c,0x460,0x454,0x464,0x7ff718241ef8,0x7ff718241f08,0x7ff718241f182⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\rsilauncher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1720 --field-trial-handle=1724,i,16562626183965830945,3694559994466872631,262144 --disable-features=HardwareMediaKeyHandling,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\rsilauncher" --standard-schemes --secure-schemes --bypasscsp-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --cors-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --fetch-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2020 --field-trial-handle=1724,i,16562626183965830945,3694559994466872631,262144 --disable-features=HardwareMediaKeyHandling,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\rsilauncher" --standard-schemes --secure-schemes --bypasscsp-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --cors-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --fetch-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-experimental-web-platform-features --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2288 --field-trial-handle=1724,i,16562626183965830945,3694559994466872631,262144 --disable-features=HardwareMediaKeyHandling,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:4972
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKLM\SOFTWARE\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum2⤵
- Modifies registry key
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RSI Launcher.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\rsilauncher" --standard-schemes --secure-schemes --bypasscsp-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --cors-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --fetch-schemes=rsi,rsi+local,rsi+qa1,rsi+qa2,rsi+qa3,rsi+qa4,rsi+qa5,rsi+qa6,rsi+qah3,rsi+uat,rsi+staging,rsi+ptu,rsi+eptu,rsi+prod,status --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=3148 --field-trial-handle=1724,i,16562626183965830945,3694559994466872631,262144 --disable-features=HardwareMediaKeyHandling,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵PID:6412
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x45c 0x4cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5229186dfc4505d1c70b63597a4df0b31
SHA12fe895c33b86245b04bba27f91d0c811c8efef66
SHA256db22397d50afdb8aaa55e4aa4c43df9662431b8eea5e6d278f17c4e167db20bc
SHA5129b6f269b8d5291205f1d1dc25dd4f9b1cee7bed7603fe64517c8736e0ec4eec2571f65f7a603fce6bde988caf4dca3329a3c7b1c72d038c35e5c73d1b04cebe4
-
Filesize
165KB
MD5581182d57f6ccec2a0520479a9c72160
SHA14cf92ff7a0e1ecf07b867931744f28d929e5ef07
SHA2566c8e870cffb22f4616a88e013f44840b6bd6f2fc23f58f6ffc60d0b85bfa34d1
SHA512d8de973fac15437c6125e5cc15adf4ada5108fad87ccbef6da793a8abbebfb5f58209b3cf6ad09e27379e6db924cb7d7ddf38ef989bd468f68c80a3a857208c1
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
86B
MD5d11dedf80b85d8d9be3fec6bb292f64b
SHA1aab8783454819cd66ddf7871e887abdba138aef3
SHA2568029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67
SHA5126b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
217B
MD519a8d2dfdba76b806dd8dbb42db07576
SHA1ea8fad3781fc8838faf04b9a208f9d4beef9efde
SHA2564ba4c1bb2a3d352a98eeaca1b72b4408565d38cf76b61110f3466c259e182012
SHA512a57521288c81c59ced12a4bcf64b35028d268887bd29f86002d93a521ccda899c776145ae739509314768af70411b80cf31e30bfce63876a07a489742f54826e
-
Filesize
345B
MD5a9480ac0531e8ffce86f987becd6b2c8
SHA19b267b2696705403504f40ca9c009538dd50a27b
SHA256465f7e2290d004401f1583dda4c0760f6c40ea8eedca02304781fc1bfa327a96
SHA512958b2c2d59cf346d6420f18788f5aab56b9ca0eb3f723e379f514bd207c337778b62d6a4f5a9a0eda0a1bdeb5adc141986815b9d7a771e71d885f9884f21e5a3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e