RTSnMg64.cpl file report

MD5 63dab9a98f2afd4ac843f4504f1afbf6
Latest seen 2021-01-02 12:36:12 (5 years ago)
First seen 2019-12-01 03:25:38 (6 years ago)
Size 3 MB

Why it matters

Evidence available for this file

Detection

Latest status is clean for this hash.

Timeline

First seen 2019-12-01 03:25:38 (6 years ago); latest analysis 2021-01-02 12:36:12 (5 years ago).

Publisher context

Company metadata: Realtek Semiconductor Corp.. Product metadata: Realtek HD Audio Sound Effect Manager.

Digital signature

Signed by Realtek Semiconductor Corp.. ThreatInfo marks this publisher as trusted for this record.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Confirm the hash and publisher match the expected software.
  2. Review the observed locations and signature information below.
  3. Rescan if the file was downloaded from an unknown source or appears in an unusual path.

RTSnMg64.cpl is a Windows file recorded in the ThreatInfo database. It is associated with Realtek HD Audio Sound Effect Manager. The reported company name is Realtek Semiconductor Corp.. The current detection status is Clean, based on the latest analysis from 2021-01-02 12:36:12 (5 years ago).

This record is currently marked as clean, but file reputation can depend on the exact path, hash, and source. Compare the MD5 and publisher data below with the file on your system.

Product Name: Realtek HD Audio Sound Effect Manager
Company Name: Realtek Semiconductor Corp.
MD5: 63dab9a98f2afd4ac843f4504f1afbf6
Size: 3 MB
First Published: 2019-12-01 03:25:38 (6 years ago)
Latest Published: 2021-01-02 12:36:12 (5 years ago)
Status: Clean (on last analysis)
Analysis Date: 2021-01-02 12:36:12 (5 years ago)
Signed By: Realtek Semiconductor Corp.
Status: Trusted Publisher

ThreatInfo marks this publisher as trusted for this record, but the file hash and source should still match the expected software distribution.

%commonappdata%\reviversoft\pc reviver\s-1-5-21-2927450747-2507301955-2091121292-1001\driver updater\downloads\2c1ae552-2137-4f0f-a13e-5da64ef8b93c
%commonappdata%\reviversoft\pc reviver\s-1-5-21-2927450747-2507301955-2091121292-1001\driver updater\downloads\53
%commonappdata%\reviversoft\pc reviver\s-1-5-21-2927450747-2507301955-2091121292-1001\driver updater\downloads\2c1ae552-2137-4f0f-a13e-5da64ef8b93c
%localappdata%\innovative solutions\drivermax\agent\uploads\066d08f813a8sw17yfgt2j4t2774w18n318990ifmm951wrpf5\media
%localappdata%\innovative solutions\drivermax\agent\restore\u67ew66793h30uoq7y54tjhavi9wn929qx2w7284y822m2cbnq\media

ThreatInfo has observed RTSnMg64.cpl in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

60.0%
20.0%
20.0%

The strongest geographic signal for this file is Saudi Arabia with 60.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for RTSnMg64.cpl is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

RTSnMg64.cpl is identified as pe for 64 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000010000000
Entry Address: 0x00017200

PE Sections:

Name Size of data MD5
.text 185344 0a2c86f9d8d68f06e036362687ae136a
.rdata 65024 4f85b72571b8fc12aefdf2da9a3d31f2
.data 13312 77082d9bdc48d4aa23dd591f86a9063e
.pdata 13824 2b9db63d4d57a308cc3ae79b8b282d56
.rsrc 3367936 20e3293c5ccfad0dd55d5e237644cb75
.reloc 12800 229f7893eb27dde93cfbc60184d92e98

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: