AACT.del threat report

MD5 03ceb413b68587cd8fc89901390df9f5
Latest seen 2025-11-19 23:01:29 (6 months ago)
First seen 2018-02-01 22:03:25 (8 years ago)
Size 990 KB
Signed by WZTeam

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for AACT.del. ThreatInfo currently classifies this sample as Crack.KMS.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows AACT.del detected as Crack.KMS. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
Crack.KMS
Last analysis
2025-11-19 23:01:29 (6 months ago)
File hash
03ceb413b68587cd8fc89901390df9f5
Download Anti-Malware

AACT.del is a Windows file recorded in the ThreatInfo database. The current detection status is Crack.KMS, based on the latest analysis from 2025-11-19 23:01:29 (6 months ago).

If AACT.del appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Crack.KMS.

MD5: 03ceb413b68587cd8fc89901390df9f5
Size: 990 KB
First Published: 2018-02-01 22:03:25 (8 years ago)
Latest Published: 2025-11-19 23:01:29 (6 months ago)
Status: Crack.KMS (on last analysis)
Analysis Date: 2025-11-19 23:01:29 (6 months ago)
AACT.del detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: WZTeam
Status: Valid

The signature on AACT.del is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%windir%
%sysdrive%\программы\cистемные\activators\kms tools portable 07.01.2018 by ratiborus\programs
%temp%\rar$exa0.838
%profile%\downloads\compressed\all activation windows 7-8-10 v19.3 2018\all activation\kms
%temp%\rar$exa3212.21630\all activation\kms
%programfiles%
%sysdrive%\программы\all activation windows (7-8-10) v19.3 2018\all activation\kms\kms tools 07.01.2018\programs
%profile%\downloads\compressed\aact_v3.8.4_portable.myegy.tv.7z
%sysdrive%\01\activation\kms tools portable\programs
%sysdrive%\torrent\microsoft toolkit collection pack february 2018 [cracksnow]\february.2018.zip\february.2018

ThreatInfo has observed AACT.del in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

AAct.exe
aact.exe
AACT.del

This hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.

42.5%
24.6%
2.8%
2.3%
2.1%
1.8%
1.8%
1.8%
1.6%
1.6%
1.3%
1.3%
1.3%
1.0%
1.0%
0.8%
0.8%
0.8%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%

The strongest geographic signal for this file is Russian Federation with 42.5% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 66.1%
Windows 7 28.2%
Windows 8.1 4.4%
Windows XP 1.3%

The most common operating system signal for AACT.del is Windows 10 with 66.1% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

AACT.del is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x001ef001

PE Sections:

Name Size of data MD5
.code 20992 62a2aecfb62cb62d149ffb2718aecb95
.text 214528 830271c473cba9423e969adc8bc1fba4
.rdata 29696 44f301756f99d97bb3a8f15e5a2daa25
.data 666112 d8b7157f6f12d5073b48a25d95dd1796
.rsrc 1024 cf31d61877f00bf317a37e37e1c75e42
.msfree 74240 edb7cd9fb56eb984dec38c8e7ced9daa
.adata 0 00000000000000000000000000000000

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: