Should I block it?
Yes, 98% block recommendation.
Possible reason:
Multiple malware detections
Additional versions
(Note, the developer publishes each variation of this file with the same version, but the hashes are unique.)
Relationships
kmservice.exe
| MD5: | 82865ff17bc664c711efa674759f9991 |
| SHA1: | 1603f72897cbd81f473a906c328a83c0413c5fb5 |
| SHA256: | f85cd6f93ba18e642d50bec7fc6aeb9d8751cc49b3be5650dd5c556628545524 |
Warning 22 antivirus scanners has detected malware.
Overview
kmservice.exe is malware that executes as a process under the SYSTEM account with extensive privileges (the system and the administrator accounts have the same file privileges) typically within the context of its parent
srvany.exe.
Details
| File name: | kmservice.exe |
| Typical file path: | C:\windows\kmservice.exe |
| Size: | 76 KB (77,824 bytes) |
| Digital DNA |
| File packed: | No |
| .NET CLR: | No |
More details
Malware detections
Based on 40+ industry antivirus scanners, 22 of them detected the following malware.
| Antivirus engine | Engine version | Detection |
| Agnitum |
5.5.1.3 |
HackTool.Keygen!0MY2AQ6aVKo |
| avast! |
6.0.1289.0 |
Win32:PUP-gen [PUP] |
| AVG |
2014.0.3629 |
Crack.CO |
| Commtouch |
5.4.1.7 |
W32/Tool.BTUK-4235 |
| Comodo Internet Security |
16116 |
ApplicUnwnt.Win32.Keygen.~hj |
| ESET NOD32 |
7.8283 |
Win32/HackKMS.A |
| Fortinet |
5.0.43.0 |
Riskware/HackKMS |
| F-Prot |
v6.4.7.1.166 |
W32/HackTool.DOI |
| Ikarus |
T3.1.4.0.0 |
possible-Threat.HackTool.Windows7 |
| K7 AntiVirus |
9.166.8611 |
Hacktool |
| K7GW |
12.7.0.12 |
Trojan |
| Malwarebytes |
1.75.0.1 |
RiskWare.Tool.CK |
| McAfee |
5.400.1158 |
Generic KeyGen |
| McAfee Gateway Anti-Malware |
v2012.1-dat |
Generic KeyGen |
| Microsoft Security Essentials |
1.9402.0 |
HackTool:Win32/Keygen |
| Norman |
7.01.04 |
Suspicious_Gen2.PJWVV |
| PC Tools |
9.0.0.2 |
Trojan.ADH |
| Symantec |
20121.3.0.76 |
Trojan.ADH |
| The Hacker |
None |
Trojan/HackKMS |
| Trend Micro |
9.740.0.1012 |
HKTL_KEYGEN |
| Trend Micro HouseCall |
9.700.0.1001 |
HKTL_KEYGEN |
| VIPRE Antivirus |
17332 |
HackTool.Win32.Keygen |
Resource utilization
(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
| CPU |
| Total CPU: | 0.00027521% | |
| Kernel CPU: | 0.00013887% | |
| User CPU: | 0.00013634% | |
| Kernel CPU time: | 78,004 ms/min | |
| CPU cycles: | 593/sec | |
| Memory |
| Private memory: | 1.39 MB | |
| Private (maximum): | 3.91 MB | |
| Private (minimum): | 3.89 MB | |
| Non-paged memory: | 1.39 MB | |
| Virtual memory: | 30.37 MB | |
| Virtual memory (peak): | 33.81 MB | |
| Working set: | 3.89 MB | |
| Working set (peak): | 4.09 MB | |
| Page faults: | 1,136/min | |
| I/O |
| I/O other transfer: | 14 Bytes/sec | |
| I/O other operations: | 1/sec | |
| Resource allocations |
| Threads: | 3 | |
| Handles: | 66 | |
Process properties
| Integrety level: | System |
| Platform: | 64-bit |
| Command line: | C:\windows\kmservice.exe |
| Owner: | SYSTEM |
| Parent process: | srvany.exe |
Distribution by Windows OS
| OS version | distribution |
| Windows 7 Ultimate |
43.75% |
|
| Windows 8 Pro |
31.25% |
|
| Windows 7 Enterprise |
12.50% |
|
| Windows 8 Pro with Media Center |
6.25% |
|
| Microsoft Windows XP |
6.25% |
|
Distribution by country
Brazil installs about 12.50% of kmservice.exe.
Distribution by PC manufacturer
| PC Manufacturer | distribution |
| Acer |
22.22% |
|
| Dell |
22.22% |
|
| ASUS |
22.22% |
|
| Hewlett-Packard |
11.11% |
|
| Alienware |
11.11% |
|
| GIGABYTE |
11.11% |
|