D:\Git\rbxfpsunlocker\x64\Release\rbxfpsunlocker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Новая папка (2)/Reaper.exe
Resource
win10v2004-20240412-en
General
-
Target
Новая папка (2).zip
-
Size
8.9MB
-
MD5
6dcd70a4d5a91c4b754f21c03113abc6
-
SHA1
ee570304a958534e3dacea58193169a88a7ebbd0
-
SHA256
f247fcf63a64fc507b125854b43fd4564cb00ea0b8ad4c9adbe24e9be87bfb0e
-
SHA512
efb1a0b23fc34b6f7578ababec6a015cadb24fb423aeaff7100b940b6a913c2235987a85930ae73b748d4631b2d08bcfa4c56b897e2d48072a3a230697ec8855
-
SSDEEP
196608:++ExZ+Hae0asE8er9b31rYjA2ifPTZNNPV8fjwioO1dK8RwgERtya03f4S77:Kxk62B8erlFkR6P9ZWP2glNP4S77
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/Новая папка (2)/Bin/FpsUnlocker.exe unpack001/Новая папка (2)/EasyExploits.dll unpack001/Новая папка (2)/Reaper.exe unpack001/Новая папка (2)/injector.dll
Files
-
Новая папка (2).zip.zip
-
Новая папка (2)/AutoExec/script.txt
-
Новая папка (2)/Bin/FpsUnlocker.exe.exe windows:6 windows x64 arch:x64
8a30acffa5d4e68c6f30f1c14d9a5f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetConsoleTextAttribute
GetStdHandle
GetProcessId
CreateMutexA
Sleep
GetLastError
CloseHandle
ReadProcessMemory
GetExitCodeProcess
Process32First
K32EnumProcessModulesEx
OpenProcess
CreateToolhelp32Snapshot
K32GetModuleFileNameExA
QueryFullProcessImageNameA
Process32Next
K32GetModuleInformation
IsWow64Process
VirtualQueryEx
GetCurrentProcess
SetConsoleTitleA
TerminateThread
FreeConsole
CreateThread
GetConsoleWindow
GetConsoleScreenBufferInfo
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
AllocConsole
WriteProcessMemory
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleHandleExW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
SetLastError
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
RtlUnwind
user32
GetWindowTextA
MessageBoxA
EnumWindows
IsWindowVisible
GetSystemMenu
GetMessageA
CheckMenuRadioItem
DispatchMessageA
LoadCursorA
CreatePopupMenu
TrackPopupMenu
ShowWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
LoadIconA
AppendMenuA
CheckMenuItem
PostQuitMessage
EnableMenuItem
RegisterClassExA
SetForegroundWindow
GetCursorPos
GetWindowThreadProcessId
gdi32
GetStockObject
shell32
ShellExecuteA
Shell_NotifyIconA
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Новая папка (2)/EasyExploits.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
E:\Users\danie\OneDrive\ee api\EasyExploits\obj\Debug\EasyExploits.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Новая папка (2)/Reaper.exe.exe windows:4 windows x86 arch:x86
a9c887a4f18a3fede2cc29ceea138ed3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Новая папка (2)/Reaper.exe.config
-
Новая папка (2)/Scripts/Aimbot 3.0.txt.js
-
Новая папка (2)/Scripts/Aimbot.txt.js
-
Новая папка (2)/Scripts/Alt+Print.txt
-
Новая папка (2)/Scripts/Arsenal Kill All.txt
-
Новая папка (2)/Scripts/Arsenal.txt
-
Новая папка (2)/Scripts/ArsenalHitboxExtender.txt
-
Новая папка (2)/Scripts/BRM5 Tp.txt
-
Новая папка (2)/Scripts/Bacon Hub.txt
-
Новая папка (2)/Scripts/BloxBurg.txt
-
Новая папка (2)/Scripts/BloxHunt.txt
-
Новая папка (2)/Scripts/Boys And Girls Hangout Gun.txt
-
Новая папка (2)/Scripts/Btools.txt
-
Новая папка (2)/Scripts/Build And Boat For Treasure.txt
-
Новая папка (2)/Scripts/CBROKillAll.txt
-
Новая папка (2)/Scripts/CC Aimbot V2.txt
-
Новая папка (2)/Scripts/CC Aimbot.txt.js
-
Новая папка (2)/Scripts/CMD-X.txt
-
Новая папка (2)/Scripts/CTRL+Del.txt
-
Новая папка (2)/Scripts/Click TP Tool.txt
-
Новая папка (2)/Scripts/Coco Hub.txt
-
Новая папка (2)/Scripts/Dark Hub.txt
-
Новая папка (2)/Scripts/Dex Explorer v2.txt.js
-
Новая папка (2)/Scripts/DexV1.txt
-
Новая папка (2)/Scripts/DexV4.txt
-
Новая папка (2)/Scripts/DivineSisters.txt
-
Новая папка (2)/Scripts/EclipseMM2.txt
-
Новая папка (2)/Scripts/FPSBoost.txt
-
Новая папка (2)/Scripts/Fathom Hub.txt
-
Новая папка (2)/Scripts/Flee The Facility.txt
-
Новая папка (2)/Scripts/Full Bright.txt
-
Новая папка (2)/Scripts/Globals Script.txt
-
Новая папка (2)/Scripts/Infinite Jump.txt
-
Новая папка (2)/Scripts/Infinite Yield.txt
-
Новая папка (2)/Scripts/Invisible Fling.txt
-
Новая папка (2)/Scripts/Jailbreak.txt
-
Новая папка (2)/Scripts/Kraken Hub.txt
-
Новая папка (2)/Scripts/LucidityMM2.txt
-
Новая папка (2)/Scripts/MM2.txt
-
Новая папка (2)/Scripts/MM2Autofarm.txt
-
Новая папка (2)/Scripts/Mad City 2.txt.js
-
Новая папка (2)/Scripts/Mad City GUI.txt
-
Новая папка (2)/Scripts/Mad City.txt
-
Новая папка (2)/Scripts/Mad Emotes.txt
-
Новая папка (2)/Scripts/MeepCity Plus.txt
-
Новая папка (2)/Scripts/MheeHub.txt
-
Новая папка (2)/Scripts/Murder Mystery 2.txt
-
Новая папка (2)/Scripts/NoClip.txt
-
Новая папка (2)/Scripts/NoClipKeybind.txt
-
Новая папка (2)/Scripts/OpFinality.txt
-
Новая папка (2)/Scripts/Ori Hub.txt
-
Новая папка (2)/Scripts/Owl Hub.txt
-
Новая папка (2)/Scripts/OxieHub.txt
-
Новая папка (2)/Scripts/Phantom Forces.txt
-
Новая папка (2)/Scripts/Prison Life.txt
-
Новая папка (2)/Scripts/Prisonware.txt
-
Новая папка (2)/Scripts/Remote Spy.txt
-
Новая папка (2)/Scripts/Reviz Admin.txt
-
Новая папка (2)/Scripts/SharkBite.txt
-
Новая папка (2)/Scripts/Simple BloxBurg Auto Farm.txt
-
Новая папка (2)/Scripts/TopKek V3.txt.js
-
Новая папка (2)/Scripts/UnitClassifiedGUI.txt
-
Новая папка (2)/Scripts/Walk On Walls.txt
-
Новая папка (2)/Scripts/ZyrexHub.txt
-
Новая папка (2)/Scripts/oofNotoriety.txt
-
Новая папка (2)/injector.dll.dll windows:6 windows x86 arch:x86
d588e0751eeca8d75865b11d7d0b6027
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
D:\Archives\repos\krnl_injector\Release\krnl_injector.pdb
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
GetExitCodeThread
CloseHandle
Module32FirstW
GetProcAddress
VirtualAllocEx
GetFileAttributesW
ReadProcessMemory
GetModuleHandleW
WideCharToMultiByte
CreateRemoteThread
Module32NextW
VirtualFreeEx
SetUnhandledExceptionFilter
WaitForSingleObject
LocalFree
WriteProcessMemory
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
UnhandledExceptionFilter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
DisableThreadLibraryCalls
InitializeSListHead
IsDebuggerPresent
advapi32
SetNamedSecurityInfoW
GetNamedSecurityInfoW
ConvertStringSidToSidW
SetEntriesInAclW
msvcp140
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
__CxxFrameHandler3
__std_exception_destroy
_except_handler4_common
memset
__std_type_info_destroy_list
_CxxThrowException
__std_exception_copy
memcpy
api-ms-win-crt-heap-l1-1-0
_callnewh
free
malloc
api-ms-win-crt-runtime-l1-1-0
_cexit
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_initterm_e
_initterm
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
_execute_onexit_table
Exports
Exports
_inject_dll@8
_is_injected@12
_pass_console_input@16
_run_script@16
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ