set_nkvltpqo.exe

Super Click Interactive

The application set_nkvltpqo.exe by Super Click Interactive has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software.
Publisher:
Flashy Authentic System Installer  (signed by Super Click Interactive)

Product:
Flashy Authentic System Installer

Version:
24.8.7.5725

MD5:
111dc6569b97604daf04c9f47ad8a6d2

SHA-1:
9280f0c1b04063bafd54b00a75c834d7a678430d

SHA-256:
60783350ff7f34da6668dbe4dc7e00b4bb9f311bda78953c9cbc86ea2dba2437

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 2:17:37 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.DownloadAdmin (M)
17.1.21.0

File size:
915.5 KB (937,504 bytes)

Product version:
24.8.7.5725

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\set_nkvltpqo.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
12/8/2015 8:56:38 PM

Valid to:
12/8/2016 8:56:38 PM

Subject:
CN=Super Click Interactive, O=Super Click Interactive, L=San Francisco, S=California, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
62A69E72E38AFE48

File PE Metadata
Compilation timestamp:
6/14/2015 3:55:08 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x25F5

Entry point:
E8, F6, BE, 00, 00, E9, 22, B7, 00, 00, CC, FF, 25, F0, 1D, 46, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, FF, 25, F8, 1D, 46, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, FF, 25, 80, 16, 46, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, FF, 25, 80, 1E, 46, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, FF, 25, 7C, 1D, 46, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 53, 55, 56, 57, 8B, 7C, 24, 14, 33, F6, 85, FF, 7E, 27, 8B, 5C, 24, 18, 8B, 2D, 84, 00, 41, 00, EB, 06, 8D, 9B, 00, 00, 00, 00, A1, 24, D1, 44, 00...
 
[+]

Entropy:
7.9597  (probably packed)

Code size:
57 KB (58,368 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-6-18-250.compute-1.amazonaws.com  (52.6.18.250:80)

TCP (HTTP):
Connects to net-inst-ash.opera.com  (37.228.108.239:80)

TCP (HTTP):
Connects to post.securestudies.com  (165.193.78.234:80)

TCP (HTTP):
Connects to host-213.158.175.90.tedata.net  (213.158.175.90:80)

TCP (HTTP):
Connects to ip-33.net-80-236-32.suresnes.rev.numericable.fr  (80.236.32.33:80)

TCP (HTTP):
Connects to a92-122-48-59.deploy.akamaitechnologies.com  (92.122.48.59:80)

TCP (HTTP SSL):
Connects to a23-6-226-33.deploy.static.akamaitechnologies.com  (23.6.226.33:443)

TCP (HTTP SSL):
Connects to a172-227-83-133.deploy.static.akamaitechnologies.com  (172.227.83.133:443)

TCP (HTTP):
Connects to 88.48.126.189.cpnet.com.br  (189.126.48.88:80)

TCP (HTTP):
Connects to 81-196-185-163.rdsnet.ro  (81.196.185.163:80)

Remove set_nkvltpqo.exe - Powered by Reason Core Security