kmplayer64.exe threat report

MD5 5238f8af9a58b585597e37f5773ac07b
Latest seen 2024-09-08 23:01:21 (2 years ago)
First seen 2024-09-08 23:01:19 (2 years ago)
Size 20 MB
Publisher KMPlayer Team
Product KMPlayer

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Hijack.Explorer. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Hijack.Explorer
Recommended action
Scan and remove
Last analysis
2024-09-08 23:01:21 (2 years ago)
File hash
5238f8af9a58b585597e37f5773ac07b
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Hijack.Explorer.

Timeline

First seen 2024-09-08 23:01:19 (2 years ago); latest analysis 2024-09-08 23:01:21 (2 years ago).

Publisher context

Company metadata: KMPlayer Team. Product metadata: KMPlayer.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

kmplayer64.exe is a Windows file recorded in the ThreatInfo database. It is associated with KMPlayer. The reported company name is KMPlayer Team. The current detection status is Hijack.Explorer, based on the latest analysis from 2024-09-08 23:01:21 (2 years ago).

If kmplayer64.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Hijack.Explorer.

Product Name: KMPlayer
Company Name: KMPlayer Team
MD5: 5238f8af9a58b585597e37f5773ac07b
Size: 20 MB
First Published: 2024-09-08 23:01:19 (2 years ago)
Latest Published: 2024-09-08 23:01:21 (2 years ago)
Status: Hijack.Explorer (on last analysis)
Analysis Date: 2024-09-08 23:01:21 (2 years ago)
kmplayer64.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%programfiles%
%programfiles%

ThreatInfo has observed kmplayer64.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is United States with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for kmplayer64.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

kmplayer64.exe is identified as pe for 64 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x00807ba0

PE Sections:

Name Size of data MD5
.text 9201152 ea5e830fbf153d02561e141da6930740
.rdata 3077632 57c65da6bcde8933b1a69fc58a8c3406
.data 126464 5f87d970fd3729e45615bd4df0e76929
.pdata 365056 99620798b835975d71ed8879a74cb853
.gfids 115712 0eefafb64a7b8462854dd582b4e8fa15
.giats 512 53164ed77f7a3f4ee6dbf2fb3c77d12b
.tls 512 1f354d76203061bfdd5a53dae48d5435
_RDATA 5120 9d8aff35877a8438d15ae40d7dec320c
.rsrc 7955968 8f7745aecd55993602e1014add228499
.reloc 137728 2c1ec397d0042848a2bd6466ac0da702

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: