rlvknlg.exe

Relevant-Knowledge

TMRG Inc.

The component is part of the TMRG platform which will track various behaviors of web browsing habits including tracking sites and domains visited as well as ads clicked. The application rlvknlg.exe by TMRG has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-230-122-103.dfw50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
TMRG, Inc.  (signed by TMRG Inc.)

Product:
Relevant-Knowledge

Version:
1.3.337.392 (Build 337.392)

MD5:
443740d21994b615210c7a486caf6c69

SHA-1:
9e7a9178883cd02a46eee4f1429f245529647487

SHA-256:
947551bb453b6385d1f8ec71afe98d07d3fccb962fc1f88f1d95d861d2358902

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/23/2024 8:05:06 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TMRG (M)
17.1.31.22

File size:
3.6 MB (3,740,576 bytes)

Product version:
1.3.337.392 (Build 337.392)

Copyright:
Copyright © 2001-2004

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\relevantknowledge\rlvknlg.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
1/17/2016 10:00:00 PM

Valid to:
2/16/2018 9:59:59 PM

Subject:
CN=TMRG Inc., O=TMRG Inc., L=Reston, S=Virginia, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
7E36C4BE2CEB69DF7BCEDB3B868E9EF9

File PE Metadata
Compilation timestamp:
12/28/2016 6:24:02 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x245F0C

Entry point:
E8, DC, 53, 01, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 58, 59, 87, 04, 24, FF, E0, 8B, FF, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 88, 5F, 64, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 9C, 0D, 04, 00, 8B, 45, 0C, 8B...
 
[+]

Code size:
2.7 MB (2,820,096 bytes)

Windows Firewall Allowed Program
Name:
rlvknlg.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wwwc.ri1.securestudies.com  (4.16.74.72:80)

TCP (HTTP):
Connects to server-54-230-122-103.dfw50.r.cloudfront.net  (54.230.122.103:80)

TCP (HTTP):
Connects to coccoc.com  (123.30.175.50:80)

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.233.34:80)

TCP (HTTP):
Connects to oss-ad-iad.securestudies.com  (165.193.78.187:80)

TCP (HTTP):
Connects to a184-28-218-130.deploy.static.akamaitechnologies.com  (184.28.218.130:80)

TCP (HTTP SSL):
Connects to wwwc.ri5.securestudies.com  (4.16.74.200:443)

TCP (HTTP):
Connects to relevantknowledge.com  (165.193.78.245:80)

TCP (HTTP SSL):
Connects to msnbot-157-55-109-228.search.msn.com  (157.55.109.228:443)

TCP (HTTP):
Connects to ec2-23-21-60-97.compute-1.amazonaws.com  (23.21.60.97:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to a23-217-171-33.deploy.static.akamaitechnologies.com  (23.217.171.33:443)

TCP (HTTP SSL):
Connects to a-0001.a-msedge.net  (204.79.197.200:443)

TCP (HTTP SSL):
Connects to wwwc.ri8.securestudies.com  (4.16.75.40:443)

TCP (HTTP):
Connects to wwwc.ri6.securestudies.com  (4.16.74.232:80)

TCP (HTTP):
Connects to wwwc.ia6.securestudies.com  (205.217.167.8:80)

TCP (HTTP):
Connects to wwwc.ia3.securestudies.com  (66.119.33.138:80)

TCP (HTTP):
Connects to ip-172-24-101-1.ec2.internal  (172.24.101.1:80)

TCP (HTTP):
Connects to hawk-iad.securestudies.com  (165.193.78.186:8080)

TCP (HTTP):

Remove rlvknlg.exe - Powered by Reason Core Security