RDLMA.exe file report

MD5 e1d499c501dc2e1f8b451f1a43bfabed
Latest seen 2021-04-05 20:27:04 (5 years ago)
First seen 2017-08-12 03:08:09 (8 years ago)
Size 54 KB

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2017-08-12 03:08:09 (8 years ago); latest analysis 2021-04-05 20:27:04 (5 years ago).

Publisher context

Company metadata: Microsoft Corporation. Product metadata: Windows Installer - Unicode.

Aliases

This hash has appeared under multiple file names, which can happen with repackaging, bundling, or deliberate renaming.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

RDLMA.exe is a Windows file recorded in the ThreatInfo database. It is associated with Windows Installer - Unicode. The reported company name is Microsoft Corporation. The current detection status is Undefined, based on the latest analysis from 2021-04-05 20:27:04 (5 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Windows Installer - Unicode
Company Name: Microsoft Corporation
MD5: e1d499c501dc2e1f8b451f1a43bfabed
Size: 54 KB
First Published: 2017-08-12 03:08:09 (8 years ago)
Latest Published: 2021-04-05 20:27:04 (5 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-04-05 20:27:04 (5 years ago)
%windir%\syswow64
%sysdrive%\rei\temp\20150418_1606\windows8.1_sp0_home_deu(1031)_ie11_wmp12_64bit\images
%profile%
%localappdata%
%appdata%
%system%
%commondir%
%localappdata%
%appdata%
%localappdata%

ThreatInfo has observed RDLMA.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

msiexec.exe
32b219753cfe2cee13a5c6cdfa4398a571462305.img
nEyUEA.exe
EITaszpFi.exe
kQoJOAuX.exe
iaiyR.exe
UAYoBE.exe
FautnYeVLOtYa.exe
eylIDI.exe
WzPAcbqBNIuy.exe
eEiehYMnUAM.exe
TGyEY.exe
iWHo.exe
gYEOrIMIcVxm.exe
OUvNuByFxz.exe
UQHArR.exe
Sjoc.exe
EYLDm.exe
qHabFHEV.exe
keowN.exe
bIjWvaf.exe
sAsUcp.exe
YiYnQYZRAU.exe
ABoMeTBucM.exe
UviAgxwb.exe
UAoIENeeePmUb.exe
OOveRIOYAEE.exe
VUoCfOiodP.exe
rELENqynaD.exe
YdOqrieWeyEle.exe
USYIoidKgthEe.exe
vhrEAAe.exe
vOyOUoioe.exe
TRrOOyIuat.exe
xyUCNOFai.exe
YYFImaIoaSuz.exe
uaYb.exe
WEyE.exe
yoOuKcUe.exe
ciNbuompJQcQ.exe
IYyCluaWRwhM.exe
CURpJigyhE.exe
YKpiCzHEqK.exe
qEILUUuw.exe
fGNydvU.exe
OLysUizVY.exe
oECaQiwXrUvU.exe
uOdYeVVmzefnb.exe
BdtjAfaiPdEU.exe
IyAOfRDLrofK.exe
jnvIOvYYo.exe
HZyUUqoYEZ.exe
YIEKwEIEbet.exe
BaEeh.exe
oxOtOOmiCwLY.exe
lkmy.exe
vGjVKUoTKc.exe
KfSbl.exe
AdoIQiOPtbADe.exe
yAivoHOLeAhM.exe
UBSBy.exe
YEnzFIoWPgoV.exe
QuyyeuCAaKoi.exe
Etad.exe
OyiOa.exe
OSsYIIlzypuo.exe
fvoAhOioUoE.exe
byhaaSkoUWLaP.exe
FaeAIkYXIuU.exe
PVaOgiYUkEu.exe
AyXanJuuEyI.exe
nKsCIYes.exe
MAieIya.exe
IIutvFwecOi.exe
eYuY.exe
yJUBUaeHkaukN.exe
VyzkwKA.exe
UvQiaeOUi.exe
YbZxHoqAeAvl.exe
nOgEgtaO.exe
yICueop.exe
yzOuElYiDdFiD.exe
UmrYOAFuVyVMz.exe
eEuMQayVc.exe
UvMiOYAyyIKAl.exe
EgooARAaAsjvE.exe
yxuwQE.exe
nDCKzjEZCUZT.exe
oxmEiogC.exe
RYnuaQn.exe
aOKkAIZhY.exe
JydSwK.exe
HAoc.exe
eEBymUeIwOage.exe
QyJofWsihYYo.exe
qfFhn.exe
XOYlAtaaeI.exe
IhUIPh.exe
qEZQBpZkEAgO.exe
UFiEa.exe
EqiOTL.exe
oSruECbUBIq.exe
DAYOeuAs.exe
OcgeiNBuU.exe
XoaYyvUgQTAv.exe
iJYSyAoae.exe
yoVOBYreGyrO.exe
yJsQeo.exe
zAAI.exe
orUfOAI.exe
IoPM.exe
nVIIRii.exe
DItIieaFOCjK.exe
UMNHNUbE.exe
wCwMoYenX.exe
UnAcif.exe
WJOu.exe
yPkgUzaX.exe
eEbIqooopiM.exe
tDROJoEiTOApz.exe
yAAiaEIyocxK.exe
LvsfxoCVbG.exe
vAOKiU.exe
yaHn.exe
TYAwhAYkUt.exe
iAiYUATe.exe
HGIoaAiIS.exe
mraAuoVyaCT.exe
UUFRxoIeHG.exe
umiFObD.exe
yfvKIDeCezOo.exe
AFDMUa.exe
USGEYdgvYNaA.exe
JUaIaeMIuUk.exe
UBEUyq.exe
DPUOydayog.exe
feiuyhyupUx.exe
OEmAILyFI.exe
BOGt.exe
sDAT.exe
UIQyZhOYVuy.exe
FxYYiiheu.exe
zziEIGq.exe
YuoaaU.exe
fYies.exe
aOAO.exe
ZqOouEE.exe
UfaaiKeqAmY.exe
gIhOtKu.exe
YOKl.exe
YEOAeeBXyzwy.exe
CAOjYpvjuPI.exe
uaOXoV.exe
KMYABKeBuYALZ.exe
YVIEoYT.exe
vlYEHZamf.exe
uWeyha.exe
huUC.exe
nJzv.exe
IhaXqfXJxC.exe
iaaoDIR.exe
UHZYGOoAOo.exe
eQoWTTgaS.exe
QEIiUyiG.exe
jXOtpOfYWuIEY.exe
jEaJGeYvXUYNI.exe
HeNjgps.exe
OoyiAyYUZma.exe
VOAmwHTIbIFU.exe
jGsuEZRybBNtn.exe
oEEsRUAesSh.exe
FAePapBU.exe
amCGdOxej.exe
OhUuhipAePER.exe
XYYEof.exe
eboO.exe
PAinooOAyAAy.exe
YiREai.exe
nEaSY.exe
eADtUtW.exe
eeVU.exe
JUcejA.exe
EGWqscySDcUI.exe
vEyHdcUDydY.exe
sOMmIOJYGv.exe
IFEu.exe
ckVksJaC.exe
refreshnerer27rb.info/6390mT6425wQ.mQP
refreshnerer27.info/092BeEQKjH1.1pJ
VYZKOAPIUs.exe
AuPpHOsD.exe
pEivEQbsFQY.exe
YYwXcoikuaOO.exe
eOOYafoYOoT.exe
EixxZIko.exe
wCuDyedy.exe
cirtuOLy.exe
UMIToiIOUs.exe
fuseGStYznAI.exe
SIfluuniIye.exe
eRhyQTEFpo.exe
OqfojpAvAWT.exe
refreshnerer108.info/s8mBu2NYw3vl.pw1
refreshnerer108rb.info/1e555cy4d04.BEk
uyDlwcdHEed.exe
iJEJsiE.exe
UHFWoqEXaeI.exe
refreshnerer27.info/C55K9vLps5.Kls
refreshnerer27rb.info/y72703z1Qv.Q3v
aekmGlouAz.exe
refreshnerer108.info/MeFL9K080.CGo
refreshnerer108rb.info/u6af54jMx.nuO
refreshnerer108.info/ZzOuBzg9RK.2q2
refreshnerer108rb.info/3gx1L2opk4mY.oUj
aVAISpojY.exe
wcpLYeuu.exe
refreshnerer108.info/37y2XFzY40yg.88P
refreshnerer108rb.info/d7xTIT19dny5.ucv
touU.exe
gImZitAeBy.exe
refreshnerer108.info/7Lgn1UG0cZW.HA1
refreshnerer108rb.info/MuNsv2t2JaJS.dbM
refreshnerer108.info/M3tH1I2zUXx.gGf
refreshnerer108rb.info/23VnkXxH.373
cifcourse.info/3167.ace /q
MHyGKgMenfy.exe
ylaAjAOAO.exe
refreshnerer27.info/WTgfUW03.10W
AeoUi.exe
QuMMMaf.exe
oyizUNoXk.exe
kaheANOIoHjL.exe
PIAdSetiRTuO.exe
yaOqAI.exe
EyIaMEYAeE.exe
YoayLjeeWmA.exe
vEkkYXJuIID.exe
refreshnerer108.info/3ye1C99mz.s07
refreshnerer108rb.info/eLo3NclpcLMb.8K1
avIEmIudy.exe
IoUIOeu.exe
EeEPOEX.exe
NhFula.exe
LJxYHE.exe
AECSObEuAoN.exe
ZyeZe.exe
UOEXFURmyAYe.exe
yjUo.exe
ieeUIryaqObOY.exe
steepexpressway.info/kawfuwfsloox.zey
steepexpressway.info/07uulquv2m79.iii
ww3away.info/4alljihrar3q.oho
ww3away.info/haetpgwofgja.voi
steepexpressway.info/07uulquv2m79.ohc
OyMkiEUAuUSUw.exe
ehASUOoaE.exe
CaUEIXhkU.exe
anwaUUoeUZX.exe
kboY.exe
steepexpressway.info/ftznjrztoald.iwp
steepexpressway.info/rkozsjmvms0s.xph
steepexpressway.info/rkozsjmvms0s.pys
ARbb.exe
refreshnerer27rb.info/A97XTHtAO9P4.eiK
refreshnerer27.info/101P1c0bxm42.1t2
YEIyo.exe
lImoAOUxP.exe
oAypioi.exe
ytaYKuGOvOrOa.exe
devground.info/mnuzlrvtkehh.krc
devground.info/sond08pixd90.aal
yeeaNhHluyy.exe
NEaKqU.exe
EFAUA.exe
kNVARpjgXa.exe
refreshnerer108rb.info/8Zc6gUd4BdL.SYn
cwoIZD.exe
refreshnerer108.info/Fq09BbjLvw.50l
refreshnerer108rb.info/1UU08s5T.P3b
AAyVIOYCUao.exe
kgeYuEHb.exe
refreshnerer108.info/C97qkeZT.K7u
AIueCoylUa.exe
insmartair.com/6fid76azhbjl.dab
insmartair.com/cwwcnrbpftvp.sul
UCuTfyAq.exe
IOAAyrtivOM.exe
hTIeeqduv.exe
ijqyJma.exe
OjGiw.exe
premiumse.info/lwoaiivjdodo.toc
premiumse.info/5gmdez6j67ee.qef
zvIoH.exe
YuiqQisikIId.exe
refreshnerer108.info/ML2AMJiX03.m8Y
ogpOYfjXG.exe
LAtau.exe
AIIolFnOxOj.exe
MCeiyOd.exe
giiYUFyZXiNM.exe
YiEyEUIo.exe
alaCigXyBdzwE.exe
refreshnerer2208.info/5YODQshux.x4N
refreshnerer2208rb.info/Zbm5EqI4.9y4
gAocYUkpoFD.exe
yamUI.exe
iaFnJLAdEu.exe
mfuEOP.exe
ycylUoMo.exe
refreshnerer2208rb.info/xFL6775iE.PHB
refreshnerer2208.info/il0Pz22i.zeC
wUFkYSOUhIT.exe
eoizkuuyYZOJI.exe
iYazcAiAxiAWI.exe
MFHoUiI.exe
autaAiiEbOi.exe
YciykTONS.exe
EWLMOYy.exe
YUoxXOyYUxzf.exe
OujdIyU.exe
iOQBVY.exe
YIEy.exe
refreshnerer1309rb.info/Z14OV9J5S52.D76
qELAV.exe
ueuOYOexHnin.exe
aYkOnaUYLoA.exe
refreshnerer1309rb.info/uH2m9G6W8X.V8r
refreshnerer1309.info/QEYu7ydq.P36
refreshnerer27rb.info/6M7m582HYR.bZI
iIZOoOWuUkI.exe
woHlUOyiaOX.exe
HYaekIUEqE.exe
refreshnerer27rb.info/Eaw4I14J.axA
yAANYUieIe.exe
yKURbMX.exe
oeHQ.exe
guWIOUUycbeCK.exe
refreshnerer27.info/CZI70XnZ.lju
QOprTEUuA.exe
uYUvueiplUd.exe
sumbersection.info/rtbvuguhysqr.ohf -q
AOAoNYILG.exe
yOHEGfeQvYujP.exe
aUbOnhuyI.exe
refreshnerer1309.info/5w4WOmBR.c61
rlbs.exe
refreshnerer1309.info/f4z6Q797X77.64X
fyWpiNH.exe
BqflIgYRoW.exe
EqahFdI.exe
refreshnerer108rb.info/C76288EYt4.95y
refreshnerer108rb.info/OqAdyn0w.9Q4
refreshnerer108.info/K3No9A0C39rF.718
yaoQDxidYobL.exe
refreshnerer1309.info/67QaA5FEA6h7.93Q
refreshnerer1309rb.info/W9iCHnHPs.2nE
riIA.exe
YjOJ.exe
EEfUuIOYu.exe
refreshnerer27.info/mka1uUTF.b9I
dhOOOAi.exe
uOaZn.exe
refreshnerer2208rb.info/3D4h5q4JfP8I.Y4h
IIwojeUa.exe
OOQwl.exe
EEAZOyKeL.exe
XiEQ.exe
UocVNuueY.exe
yOpaCT.exe
refreshnerer1309rb.info/79yeb35ky4.Qjj
CoIyuIEWKPEJ.exe
refreshnerer1309rb.info/Dzl6E58A3b.3KL
refreshnerer1510.info/76tEViJt.H26
YaUf.exe
BivHHEoJuoeu.exe
eQCoNYzOiWO.exe
WoeUiEgyAn.exe
QOMOdve.exe
refreshnerer1510.info/A4z4tdO7v71V.27E -q
refreshnerer1510rb.info/8OBCJgn8q.8u6
freshrefreshnerer184.info/o4ndhg664.JHC
EysAOaO.exe
ugYiaiZiiLbSY.exe
AYwosYiul.exe
hbonAeWVpix.exe
qyHIyYxZYCe.exe
OyyunPWo.exe
OIxkAIofbMvi.exe
uiRyaXOP.exe
HoioqwH.exe
refreshnerer1309.info/pX7o0039.Q04
ylFrtiaA.exe
aBTGcOWaAYn.exe
aEifNWnuuOjY.exe
refreshnerer1510rb.info/Y97TIxwak.pla /q
refreshnerer1510.info/2a3Cz8yq8Qa.07d
EXDyOhVVO.exe
refreshnerer2208rb.info/h1m13Vbbwkg.A1E
guardname.net/1w3uzqnb70t5.oil
guardname.net/gekofvxtpfhh.dkk
refreshnerer1510.info/NH8bY0MCS6Q.j79
refreshnerer1510rb.info/0eeFkn61J4.F6P
RDLMA.exe

This hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.

24.1%
10.0%
8.5%
8.2%
7.8%
4.4%
3.1%
2.9%
2.6%
2.0%
1.9%
1.7%
1.7%
1.3%
1.3%
1.3%
1.2%
1.0%
0.8%
0.8%
0.7%
0.7%
0.7%
0.7%
0.7%
0.7%
0.6%
0.6%
0.6%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.4%
0.4%
0.4%
0.4%
0.2%
0.2%
0.2%
0.2%
0.2%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%

The strongest geographic signal for this file is Russian Federation with 24.1% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 8.1 96.0%
Windows 10 4.0%

The most common operating system signal for RDLMA.exe is Windows 8.1 with 96.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

RDLMA.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x0000187a

PE Sections:

Name Size of data MD5
.text 34304 1b85baadfa4f5ec9b0116b11547220ba
.data 6144 fd31e90b08cc9f6de0d5c3f116b2d61b
.idata 3584 8bd52171a4917286e8403adefac9e81c
.rsrc 8192 8578f6c0f122878f84c966a38d3a0d79
.reloc 2560 84a0d7552b5714967c761fb9ff7f15a4

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: