Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
raw.githubusercontent.com | 35802 | 2014-02-06 | 2014-03-01 | 2025-05-07 | 548 B | 16 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2025-05-10 | medium | raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
2025-05-10 | medium | raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe | Identifies executable converted using PyInstaller. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe
IP
185.199.110.133
ASN
#54113 FASTLY
File type
PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
Size
16 MB (16411785 bytes)
Hash
7327729a164a1f1e3ed2385833923a96
44d64eae30c7fcf10db081dcfb90b7319b91bb7e
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
Public InfoSec YARA rules | malware | Identifies executable converted using PyInstaller. |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe | ![]() | 200 OK | 16 MB | |||||||||||||
Detections
HTTP Headers
| ||||||||||||||||