Report Overview
Visitedpublic
2025-05-06 06:50:41
Tags
Submit Tags
URL
download.sysinternals.com/files/RAMMap.zip
Finishing URL
about:privatebrowsing
IP / ASN
13.107.246.53
#8075 MICROSOFT-CORP-MSN-AS-BLOCK
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Host Summary

HostRankRegisteredFirst SeenLast Seen
download.sysinternals.com
317209unknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
download.sysinternals.com/files/RAMMap.zip
IP / ASN
13.107.246.53
#8075 MICROSOFT-CORP-MSN-AS-BLOCK
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size687 kB (687327 bytes)
MD52a730bb3cb813286d872ac6a754ffebd
SHA11385669404022211e34010c1395509fda3ebe36f
Archive (4)
FilenameMD5File type
RAMMap.exef8c7e41d1fbe9bee01fb44244087ae86PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
RAMMap64.exe633470671cc8035b945f7ccad2cd4024PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
RAMMap64a.exe1de68434548372c7d3eb79b3f10fca3ePE32+ executable (GUI) Aarch64, for MS Windows, 6 sections
Eula.txt8c24c4084cdc3b7e7f7a88444a012bfcUnicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET download.sysinternals.com/files/RAMMap.zip
13.107.246.53200 OK687 kB