kmplayer-setup.exe

TEA TIME BISCUITS

The application kmplayer-setup.exe by TEA TIME BISCUITS has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the Tomorrow Software Installer installer. The file has been seen being downloaded from files5.downloadmaster1.com.
Publisher:
KMP Setup  (signed by TEA TIME BISCUITS)

Product:
KMP Setup

Version:
47.0.9.2069

MD5:
67590165b7b3541b4abf1dec47335890

SHA-1:
3dd1ef2fc3659c1acb6331c6915c36c17b8d7b92

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 5:36:48 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Jaik.8223
529

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.08.16

Avira AntiVirus
PUA/DownloadAdmin.Gen7
8.3.1.6

AVG
Generic
2016.0.3007

Baidu Antivirus
PUA.Win32.DownloadAdmin
4.0.3.15825

Bitdefender
Gen:Variant.Application.Jaik.8223
1.0.20.1185

Bkav FE
HW32.Packed
1.3.0.7062

Comodo Security
UnclassifiedMalware
23013

Dr.Web
Adware.DownloadAdmin.12
9.0.1.0237

ESET NOD32
Win32/DownloadAdmin.M potentially unwanted (variant)
9.12099

Fortinet FortiGate
Riskware/DownloadAdmin
8/25/2015

F-Prot
W32/DownloAdmin.A.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Jaik
11.2015-25-08_3

G Data
Gen:Variant.Application.Jaik.8223
15.8.25

IKARUS anti.virus
PUA.DownloadAdmin
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.2016900

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.08.25.01

McAfee
DownloadAdmin
5600.6663

MicroWorld eScan
Gen:Variant.Application.Jaik.8223
16.0.0.711

NANO AntiVirus
Trojan.Win32.Vittalia.dunmel
0.30.24.3079

Panda Antivirus
Generic Suspicious
15.08.25.01

Qihoo 360 Security
Win32/Virus.1d7
1.0.0.1015

Reason Heuristics
PUP.TomorrowSoftware.TEATIMEBISCUITS.Bundler (M)
15.8.25.1

Rising Antivirus
PE:Malware.DownloadAdmin!6.26F9
23.00.65.15823

Sophos
Generic PUA BA (PUA)
4.98

Trend Micro
TROJ_GEN.R08NC0OHB15
10.465.25

Vba32 AntiVirus
Downloader.DownloAdmin
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
42910

File size:
837.5 KB (857,616 bytes)

Product version:
47.0.9.2069

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Common path:
C:\Documents and Settings\{user}\My documents\downloads\kmplayer-setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/10/2015 8:00:00 AM

Valid to:
6/10/2016 7:59:59 AM

Subject:
CN=TEA TIME BISCUITS, O=TEA TIME BISCUITS, L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
045E02431B8F3D0264586744F7C513CB

File PE Metadata
Compilation timestamp:
8/7/2014 4:05:41 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:PZMLKmtvPyHu7xtwhUKqkCYviUbo5cN+2QHC5v:RiKmHyOltWNpCdU0wQ8

Entry address:
0xC822

Entry point:
E8, 3C, 05, 00, 00, E9, 57, FD, FF, FF, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, A8, 4B, 41, 00, 89, 0D, A4, 4B, 41, 00, 89, 15, A0, 4B, 41, 00, 89, 1D, 9C, 4B, 41, 00, 89, 35, 98, 4B, 41, 00, 89, 3D, 94, 4B, 41, 00, 66, 8C, 15, C0, 4B, 41, 00, 66, 8C, 0D, B4, 4B, 41, 00, 66, 8C, 1D, 90, 4B, 41, 00, 66, 8C, 05, 8C...
 
[+]

Entropy:
7.9530  (probably packed)

Code size:
51.5 KB (52,736 bytes)

The file kmplayer-setup.exe has been seen being distributed by the following URL.

Remove kmplayer-setup.exe - Powered by Reason Core Security