KMSTools.exe threat report

MD5 c6edfab88c55137d5f449c4e36b3bb9b
Latest seen 2025-07-25 23:01:24 (10 months ago)
First seen 2019-03-05 14:43:55 (7 years ago)
Size 42 MB
Publisher Ratiborus
Signed by WZTeam

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for KMSTools.exe. ThreatInfo currently classifies this sample as Crack.KMS.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows KMSTools.exe detected as Crack.KMS. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
Crack.KMS
Last analysis
2025-07-25 23:01:24 (10 months ago)
File hash
c6edfab88c55137d5f449c4e36b3bb9b
Download Anti-Malware

KMSTools.exe is a Windows file recorded in the ThreatInfo database. It is associated with KMS Tools Portable x86. The reported company name is Ratiborus. The current detection status is Crack.KMS, based on the latest analysis from 2025-07-25 23:01:24 (10 months ago).

If KMSTools.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Crack.KMS.

Product Name: KMS Tools Portable x86
Company Name: Ratiborus
MD5: c6edfab88c55137d5f449c4e36b3bb9b
Size: 42 MB
First Published: 2019-03-05 14:43:55 (7 years ago)
Latest Published: 2025-07-25 23:01:24 (10 months ago)
Status: Crack.KMS (on last analysis)
Analysis Date: 2025-07-25 23:01:24 (10 months ago)
KMSTools.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: WZTeam
Status: Valid

The signature on KMSTools.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%sysdrive%\downloads
%desktop%
%sysdrive%\[2017歲末版] 光碟隨身碟 系統安裝、維護工具整合iso
%sysdrive%\iso
%desktop%
%sysdrive%\برامج كمبيوتر\برامج تفعيل الويندوز
%sysdrive%\programok\winjóság\ratiborus
%profile%\downloads
%sysdrive%\01.05.2019-alles gemicht\programme\kms tools 01.01.2019-ratiborus\kms tools 01.01.2019-ratiborus
%sysdrive%\01.05.2019-alles gemicht\programme\kms tools 01.01.2019-ratiborus

ThreatInfo has observed KMSTools.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

15.2%
10.9%
8.7%
8.7%
6.5%
4.3%
4.3%
4.3%
4.3%
4.3%
4.3%
4.3%
2.2%
2.2%
2.2%
2.2%
2.2%
2.2%
2.2%
2.2%
2.2%

The strongest geographic signal for this file is Brazil with 15.2% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 76.1%
Windows 7 8.7%
Windows 8.1 8.7%
Windows XP 2.2%
Windows Server 2012 R2 2.2%
Windows Server 2016 2.2%

The most common operating system signal for KMSTools.exe is Windows 10 with 76.1% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

KMSTools.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x00001000

PE Sections:

Name Size of data MD5
.code 82432 2f1586b6819e6e57da2549f67ba6bdee
.text 478720 1c7130635b0b206690c0e8041ff12b53
.rdata 105472 172c011cfe1f8cf8ac3d714fdb31e6dd
.data 43495936 b5e68b8c8b63ae1301026f16f2d5caca
.rsrc 107520 bfd91d8b87032f2384477cf71085352b

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: