KMSTools.exe threat report

MD5 15cd175e5301effe63475853677cbc8a
Latest seen 2025-05-31 23:01:16 (12 months ago)
First seen 2019-12-08 17:09:06 (6 years ago)
Size 49 MB
Publisher Ratiborus
Signed by WZTeam

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for KMSTools.exe. ThreatInfo currently classifies this sample as Crack.KMS.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows KMSTools.exe detected as Crack.KMS. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
Crack.KMS
Last analysis
2025-05-31 23:01:16 (12 months ago)
File hash
15cd175e5301effe63475853677cbc8a
Download Anti-Malware

KMSTools.exe is a Windows file recorded in the ThreatInfo database. It is associated with KMS Tools Portable x86. The reported company name is Ratiborus. The current detection status is Crack.KMS, based on the latest analysis from 2025-05-31 23:01:16 (12 months ago).

If KMSTools.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Crack.KMS.

Product Name: KMS Tools Portable x86
Company Name: Ratiborus
MD5: 15cd175e5301effe63475853677cbc8a
Size: 49 MB
First Published: 2019-12-08 17:09:06 (6 years ago)
Latest Published: 2025-05-31 23:01:16 (12 months ago)
Status: Crack.KMS (on last analysis)
Analysis Date: 2025-05-31 23:01:16 (12 months ago)
KMSTools.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: WZTeam
Status: Valid

The signature on KMSTools.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%sysdrive%
%temp%
%sysdrive%\downloads\application\ratiborus kms tools december (01.12.2019) (office and windows activators) {b4tman}
%sysdrive%
%sysdrive%
%programfiles%
%profile%\downloads
%sysdrive%\finiti
%profile%\downloads\ratiborus kms tools december (01.12.2019) (office and windows activators) {b4tman}
%profile%\downloads\ratiborus_kms_tools_01.12.2019_downloadly.ir.rar

ThreatInfo has observed KMSTools.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

12.3%
7.4%
6.7%
6.1%
5.5%
3.7%
3.7%
3.7%
3.7%
3.1%
3.1%
1.8%
1.8%
1.8%
1.8%
1.8%
1.8%
1.8%
1.8%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%

The strongest geographic signal for this file is Russian Federation with 12.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 74.8%
Windows 7 12.6%
Windows 8.1 8.8%
Windows 8 1.9%
Windows Server 2016 1.9%

The most common operating system signal for KMSTools.exe is Windows 10 with 74.8% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

KMSTools.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x00001000

PE Sections:

Name Size of data MD5
.code 60416 f880011dbe65935301c58b0299c68e85
.text 478720 2d9b0d8fdd2ff8e1dd29ef74a5e02ff7
.rdata 105472 0522fbc93ddf7a46694509cfd144d29c
.data 50832384 85c0c1dcee345324629fc564007b0c33
.rsrc 107520 e4c0dabfc831be30c500bfbf62d26279

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: