Report Overview

  1. Visited public
    2025-05-10 07:03:54
    Tags
  2. URL

    raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    185.199.109.133

    #54113 FASTLY

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012025-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exeDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
mediumraw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exeIdentifies executable converted using PyInstaller.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections

    Size

    16 MB (16411785 bytes)

  2. Hash

    7327729a164a1f1e3ed2385833923a96

    44d64eae30c7fcf10db081dcfb90b7319b91bb7e

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies executable converted using PyInstaller.
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/princeftw/roblox-fps-unlocker/main/rblxfpsunlocker.exe
185.199.110.133200 OK16 MB