rlvknlg.exe

Relevant-Knowledge

TMRG Inc.

The component is part of the TMRG platform which will track various behaviors of web browsing habits including tracking sites and domains visited as well as ads clicked. The application rlvknlg.exe by TMRG has been detected as adware by 17 anti-malware scanners. This file is typically installed with the program RelevantKnowledge by TMRG, Inc. which is a potentially unwanted software program. Part of RelevantKnowledge, a program typically installed via a software bundle (with the user's knowledge should they read the EULA) and will run in the background collecting and monitoring information about the user's behavior in order to build an extensive profile.
Publisher:
TMRG, Inc.  (signed by TMRG Inc.)

Product:
Relevant-Knowledge

Version:
1.3.336.320 (Build 336.320)

MD5:
2a45a01e76d13ed9f7691074ee882512

SHA-1:
4dcdcac6fd7a841c1973c105a0d8a1fdd5dac440

SHA-256:
0f682319d959622f6138a4e3de6f0652606b6eb4e620dd2f31bbaa449eb493f9

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Bundled via 3rd-party installers and monitors the user's behavior.

Analysis date:
12/26/2024 3:13:26 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Adware.Gen
7.11.120.238

avast!
Win32:Relevant-W [PUP]
2014.9-131223

AVG
MalSign.Relevant Knowledge
2014.0.3616

Bkav FE
W32.Clod575.Trojan
1.3.0.4613

Boost by Reason
Optional.TMRG.H
188163

Comodo Security
ApplicUnwnt
17460

Dr.Web
DLOADER.Trojan
9.0.1.0357

ESET NOD32
Win32/Adware.RK.AE (variant)
7.9190

Fortinet FortiGate
Riskware/RK
12/23/2013

F-Prot
W32/Relevant.A.gen
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.174.10575

Malwarebytes
PUP.Adware.RelevantKnowledge
v2013.12.23.09

McAfee
Artemis!8E4A812A0F79
5600.7272

Reason Heuristics
PUP.TMRG.H
14.2.16.6

Sophos
Generic Proxy-OSS Application
4.96

Trend Micro House Call
TROJ_GEN.F47V0826
7.2.357

VIPRE Antivirus
Marketscore.RelevantKnowledge
24550

File size:
3.3 MB (3,502,360 bytes)

Product version:
1.3.336.320 (Build 336.320)

Copyright:
Copyright © 2001-2004

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\relevantknowledge\rlvknlg.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/22/2011 3:00:00 AM

Valid to:
12/22/2013 2:59:59 AM

Subject:
CN=TMRG Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TMRG Inc., L=Reston, S=Virginia, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5DF4DBF0974A7733E43AAA5A09FCB55C

File PE Metadata
Compilation timestamp:
8/17/2013 12:41:00 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:Aq01oTCXAPOKvaQ3qW9nDNEC6r4LmooJzyQHlVzxuIirqKf3bbbA/grdj1fNyvmd:dPOKvaQ3qW9nDkJPFKBPvbA/grdj1fNB

Entry address:
0x2334B2

Entry point:
E8, B1, 47, 01, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 8B, FF, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 2E, 35, 63, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 9A, D0, 03, 00, 8B, 45, 0C, 8B...
 
[+]

Entropy:
6.5598

Code size:
2.6 MB (2,723,840 bytes)

The file rlvknlg.exe has been discovered within the following program.

RelevantKnowledge  by TMRG, Inc.
Relevant-Knowledge maintains a group of users who have monitoring software (with brands including PermissionResearch, OpinionSquare and VoiceFive Networks) installed on their PCs in exchange for joining the Relevant-Knowledge research panels, users are presented with various benefits, including computer security software, Internet data storage, virus scanning and chances to win cash or prizes.
www.relevantknowledge.com
70% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wwwc.ri3.securestudies.com  (4.16.74.136:80)

TCP (HTTP):
Connects to oss-ad-iad.securestudies.com  (165.193.78.187:80)

TCP (HTTP):
Connects to falcoware.com  (195.211.101.87:80)

TCP (HTTP SSL):
Connects to a88-221-191-8.deploy.akamaitechnologies.com  (88.221.191.8:443)

TCP (HTTP):
Connects to a23-40-112-105.deploy.static.akamaitechnologies.com  (23.40.112.105:80)

TCP (HTTP):
Connects to wwwc.ri9.securestudies.com  (4.16.75.72:80)

TCP (HTTP):
Connects to hawk-iad.securestudies.com  (165.193.78.186:8080)

TCP (HTTP):
Connects to wwwc.ia6.securestudies.com  (205.217.167.8:80)

TCP (HTTP):
Connects to wwwc.ri7.securestudies.com  (4.16.75.8:80)

TCP (HTTP):
Connects to wwwc.ri6.securestudies.com  (4.16.74.232:80)

TCP (HTTP):
Connects to wwwc.ia7.securestudies.com  (205.217.176.8:80)

TCP (HTTP):
Connects to wwwc.ria.securestudies.com  (184.80.40.40:80)

TCP (HTTP):
Connects to wwwc.ri5.securestudies.com  (4.16.74.200:80)

TCP (HTTP):
Connects to wwwc.ri4.securestudies.com  (4.16.74.168:80)

TCP (HTTP):
Connects to wwwc.ri2.securestudies.com  (4.16.74.104:80)

TCP (HTTP):
Connects to wwwc.ia9.securestudies.com  (205.218.48.200:80)

TCP (HTTP):
Connects to wwwc.ia4.securestudies.com  (66.119.33.170:80)

TCP (HTTP):
Connects to wwwc.ia3.securestudies.com  (66.119.33.138:80)

TCP (HTTP):
Connects to wwwc.ia1.securestudies.com  (165.193.73.40:80)

TCP (HTTP SSL):
Connects to post.securestudies.com  (165.193.78.234:443)

Remove rlvknlg.exe - Powered by Reason Core Security