Detects Vape V4 injected into a Minecraft instance.
Vape injects its cheat DLL into Minecraft by writing the entire PE flat into a single allocation and marking it PAGE_EXECUTE_READWRITE. The injected PE is protected with Themida/WinLicense, which adds a section called .vlizer.
The detector:
- Finds
javaw.exeorjava.exe - Walks the process memory with
VirtualQueryExlooking for private, committed, RWX regions - Checks if the region starts with an
MZheader and has a validPEsignature - Parses the PE section table looking for a section named
.vlizer - If found, prints the base address of the injected module
After scanning, you can dump vapes module (vapes dll) to a vape-V4-{n}.bin.
MSVC:
open the sln and build with vs 22 - 26
just open the exe when it builds after injecting vape-v4
output
looking for vape v4
vape v4 found @ 0x000002F9BCC40000
dump? (y/n): n
- Enables
SeDebugPrivilegeon its process token - Allocates memory in Minecraft with
VirtualAllocEx(MEM_COMMIT | MEM_RESERVE,PAGE_READWRITE) - Writes the entire PE with
WriteProcessMemory - Flips the region to
PAGE_EXECUTE_READWRITEwithVirtualProtectEx - Starts a remote thread with
CreateRemoteThreadat an export named"tim"in the injected PE
also for some reason vape maps the same dll twice, for no reason -_- so it will always show 2 instances
so they map the module then the module maps the same module then messes with the 1st dll's pages?, its fucked, but this does work 100% of the time as of right now
ptview output