Report Overview

  1. Submitted URL

    download.sysinternals.com/files/RAMMap.zip

  2. IP

    152.199.19.160

    ASN

    #15133 EDGECAST

  3. Submitted

    2024-03-29 09:55:44

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.sysinternals.com3172091998-04-122012-05-212024-03-28

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.sysinternals.com/files/RAMMap.zip

  2. IP

    152.199.19.160

  3. ASN

    #15133 EDGECAST

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    687 kB (687327 bytes)

  2. Hash

    2a730bb3cb813286d872ac6a754ffebd

    1385669404022211e34010c1395509fda3ebe36f

  1. Archive (4)

  2. FilenameMd5File type
    RAMMap.exe
    f8c7e41d1fbe9bee01fb44244087ae86
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    RAMMap64.exe
    633470671cc8035b945f7ccad2cd4024
    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
    RAMMap64a.exe
    1de68434548372c7d3eb79b3f10fca3e
    PE32+ executable (GUI) Aarch64, for MS Windows, 6 sections
    Eula.txt
    8c24c4084cdc3b7e7f7a88444a012bfc
    Unicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
download.sysinternals.com/files/RAMMap.zip
152.199.19.160200 OK687 kB