qkseeSvc.exe

qksee

Jinnan Wu

The application qkseeSvc.exe by Jinnan Wu has been detected as a potentially unwanted program by 7 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “qkseeService”. While running, it connects to the Internet address 8.81.6132.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
Qksee Pvt Ltd.  (signed by Jinnan Wu)

Product:
qksee

Description:
qksee service

Version:
3.1.0.0

MD5:
c9f546e817733b41c8332b0817577616

SHA-1:
de22a025163d43fbc42a76b441a72ff87d71710b

SHA-256:
b812b27c41f9d2059647d759838aed973a79eb6762c6470303dd9d8102c234c2

Scanner detections:
7 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 5:49:52 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Mutabaha.1237
9.0.1.05190

Emsisoft Anti-Malware
Application.Elex.AO
9.0.0.4157

ESET NOD32
Win32/ELEX.HU potentially unwanted application
8.0.319.0

F-Secure
Riskware.Application.Elex.AO
5.15.96

Microsoft Security Essentials
Threat.Undefined
1.221.345.0

Norman
Application.Elex.AO
19.05.2016 05:17:13

VIPRE Antivirus
Threat.4150696
49494

File size:
733.8 KB (751,384 bytes)

Product version:
3.1.0.0

Copyright:
Copyright (c) 2015 Qksee Pvt Ltd. All Rights Reserved.

Original file name:
qkseeSvc.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\qksee\qkseesvc.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
4/29/2016 2:00:00 AM

Valid to:
1/18/2017 12:59:59 AM

Subject:
CN=Jinnan Wu, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
65B3C9B68FC08BFB2F98399F8394AF86

File PE Metadata
Compilation timestamp:
5/3/2016 3:40:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:yxb9X8qUmlLa0PUV6fmRgZQzlxb7Rah3r7AU4BIEtHTWiesHYy:yxb9NUmlO0PUIfRGx3RY3v4hHTWiemYy

Entry address:
0x566C5

Entry point:
E8, 2F, E9, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 51, 83, 65, FC, 00, 56, 8D, 45, FC, 50, FF, 75, 0C, FF, 75, 08, E8, 94, EA, 00, 00, 8B, F0, 83, C4, 0C, 85, F6, 75, 18, 39, 45, FC, 74, 13, E8, A7, 22, 00, 00, 85, C0, 74, 0A, E8, 9E, 22, 00, 00, 8B, 4D, FC, 89, 08, 8B, C6, 5E, C9, C3, 55, 8B, EC, 8B, 45, 0C, 8B, 4D, 08, 83, EC, 0C, 85, C0, 74, 02, 89, 08, 85, C9, 75, 14, E8, 79, 22, 00, 00, C7, 00, 16, 00, 00, 00, E8, B1, 66, 00, 00, 33, C0, C9, C3, 8B, 45, 10, 85, C0, 74, 0A, 83, F8, 02, 7C, E0, 83, F8...
 
[+]

Code size:
472 KB (483,328 bytes)

Service
Display name:
qkseeService

Type:
Win32OwnProcess

Group:
SchedulerGroup


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-206-211.atl50.r.cloudfront.net  (54.230.206.211:80)

TCP (HTTP):
Connects to server-54-192-37-117.jfk1.r.cloudfront.net  (54.192.37.117:80)

TCP (HTTP):
Connects to 8.81.6132.ip4.static.sl-reverse.com  (50.97.129.8:80)

TCP (HTTP):
Connects to server-54-230-206-172.atl50.r.cloudfront.net  (54.230.206.172:80)

TCP (HTTP):
Connects to server-54-230-5-180.dfw3.r.cloudfront.net  (54.230.5.180:80)

TCP (HTTP):
Connects to server-54-239-132-235.sfo9.r.cloudfront.net  (54.239.132.235:80)

TCP (HTTP):
Connects to server-54-230-206-152.atl50.r.cloudfront.net  (54.230.206.152:80)

TCP (HTTP):
Connects to server-54-230-163-132.jax1.r.cloudfront.net  (54.230.163.132:80)

TCP (HTTP):
Connects to server-54-192-123-70.dfw50.r.cloudfront.net  (54.192.123.70:80)

Remove qkseeSvc.exe - Powered by Reason Core Security