kml.exe

The application kml.exe has been detected as a potentially unwanted program by 5 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “kml”.
MD5:
4cfb68fe16583921830adce8149e5037

SHA-1:
ec93c78fb2a766581e20732e378a72600d2c7a64

SHA-256:
bcd8ed3186219d71edf88a3f40bc9ede3aba800b5c1b27b5909687442c1f8bd9

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
11/24/2024 2:01:23 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Dropper-gen [Drp]
2014.9-150712

Emsisoft Anti-Malware
Trojan.GenericKD.2283928
8.15.07.12.02

F-Secure
Trojan.GenericKD.2283928
11.2015-12-07_1

Malwarebytes
PUP.Optional.Core.A
v2015.07.12.02

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.11.22

File size:
509 KB (521,216 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\kml.exe

File PE Metadata
Compilation timestamp:
3/31/2015 2:31:28 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
12.0

CTPH (ssdeep):
12288:tHHNhARU4trkJj0jvzEgvta2qSjeHKrPlnR+W:toO4NkzvS/nR+W

Entry address:
0x111C1

Entry point:
E8, 12, C1, 00, 00, E9, 7B, FE, FF, FF, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 80, C2, 47, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, E8, A4, 47, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 80, C2, 47, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7...
 
[+]

Code size:
403.5 KB (413,184 bytes)

Service
Display name:
kml

Type:
Win32OwnProcess


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to s3-us-west-2-w.amazonaws.com  (54.231.177.6:80)

Remove kml.exe - Powered by Reason Core Security