rlvknlg.exe

Relevant-Knowledge

TMRG Inc.

The component is part of the TMRG platform which will track various behaviors of web browsing habits including tracking sites and domains visited as well as ads clicked. The application rlvknlg.exe by TMRG has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address wwwc.ia1.securestudies.com on port 80 using the HTTP protocol.
Publisher:
TMRG, Inc.  (signed by TMRG Inc.)

Product:
Relevant-Knowledge

Version:
1.3.337.392 (Build 337.392)

MD5:
0022b99a3357cd038f0e240e6ab218ea

SHA-1:
22c42cd910ab5cc7c42062d3ebac5586b806fb95

SHA-256:
bdcb3e9226883ba979da54714e6bfb7f57c33f79d20468ffec7ce86b574fb3b8

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/23/2024 7:16:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TMRG (M)
17.1.20.3

File size:
3.6 MB (3,740,576 bytes)

Product version:
1.3.337.392 (Build 337.392)

Copyright:
Copyright © 2001-2004

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\rlvknlg.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
1/18/2016 1:00:00 AM

Valid to:
2/17/2018 12:59:59 AM

Subject:
CN=TMRG Inc., O=TMRG Inc., L=Reston, S=Virginia, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
7E36C4BE2CEB69DF7BCEDB3B868E9EF9

File PE Metadata
Compilation timestamp:
12/28/2016 9:24:02 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x245F0C

Entry point:
E8, DC, 53, 01, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 8B, FF, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 88, 5F, 64, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 9C, 0D, 04, 00, 8B, 45, 0C, 8B...
 
[+]

Code size:
2.7 MB (2,820,096 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-236-78-49.compute-1.amazonaws.com  (54.236.78.49:80)

TCP (HTTP):
Connects to ec2-52-70-3-92.compute-1.amazonaws.com  (52.70.3.92:80)

TCP (HTTP):
Connects to wwwc.ri9.securestudies.com  (4.16.75.72:80)

TCP (HTTP):
Connects to oss-ad-iad.securestudies.com  (165.193.78.187:80)

TCP (HTTP):
Connects to wwwc.ia3.securestudies.com  (66.119.33.138:80)

TCP (HTTP):
Connects to van.edu.vn  (188.166.251.38:80)

TCP (HTTP):
Connects to eclipsecon.org  (198.41.30.205:80)

TCP (HTTP):
Connects to c-q100-u1152-215.webazilla.com  (204.155.145.215:80)

TCP (HTTP):
Connects to coccoc.com  (123.30.175.29:80)

TCP (HTTP):
Connects to c-d040-u2647-07.webazilla.com  (206.54.174.7:80)

TCP (HTTP):

TCP (HTTP):
Connects to hawk-iad.securestudies.com  (165.193.78.186:8080)

TCP (HTTP):
Connects to wwwc.ria.securestudies.com  (184.80.40.40:80)

TCP (HTTP):
Connects to wwwc.ri6.securestudies.com  (4.16.74.232:80)

TCP (HTTP):
Connects to wwwc.ia4.securestudies.com  (66.119.33.170:80)

TCP (HTTP SSL):
Connects to ec2-54-217-215-80.eu-west-1.compute.amazonaws.com  (54.217.215.80:443)

TCP (HTTP):
Connects to 123.103.19.70-BJ-CNC  (123.103.19.70:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-sin6.fbcdn.net  (157.240.7.26:443)

TCP (HTTP):
Connects to wwwc.ri8.securestudies.com  (4.16.75.40:80)

TCP (HTTP):
Connects to wwwc.ri5.securestudies.com  (4.16.74.200:80)

Remove rlvknlg.exe - Powered by Reason Core Security