rammap.exe

RamMap

Microsoft Corporation

Publisher:
Sysinternals - www.sysinternals.com  (signed by Microsoft Corporation)

Product:
RamMap

Description:
RamMap - physical memory analyzer

Version:
1.50

MD5:
324939df8d069dbe5150e772839a5012

SHA-1:
708d643b746e8a22164a50790a50efe1e9eb8e3f

SHA-256:
30e14e158dd76ec712ccc6b5fd1e58ddeaa653e682e968da0229be13bed2bc27

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)
Whitelisted  (by digital signature)

Analysis date:
4/27/2024 3:43:28 AM UTC  (today)

File size:
611.1 KB (625,816 bytes)

Product version:
1.50

Copyright:
Copyright © 2010-2016 Mark Russinovich

Original file name:
RamMap

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\sysinternalssuite\rammap.exe

Digital Signature
Authority:
Microsoft Corporation

Valid from:
6/4/2015 10:42:45 AM

Valid to:
9/4/2016 10:42:45 AM

Subject:
CN=Microsoft Corporation, OU=MOPR, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Issuer:
CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Serial number:
330000010A2C79AED7797BA6AC00010000010A

File PE Metadata
Compilation timestamp:
1/27/2016 11:18:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:6WABaqilusbSKJm+OOyqt2r8vMHAEbl1eUG0eIxsce3:6O3uslJHryo6cgAEmUnxsce3

Entry address:
0x1A4EF

Entry point:
E8, 64, 93, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 98, 9F, 43, 00, E8, 2B, 0B, 00, 00, E8, 51, 70, 00, 00, 0F, B7, F0, 6A, 02, E8, F7, 92, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 81, 58, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4981

Code size:
169 KB (173,056 bytes)

The file rammap.exe has been seen being distributed by the following URL.