Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ValorantHack.exe

Overview

General Information

Sample name:ValorantHack.exe
Analysis ID:1561388
MD5:a79b1017bbfe997cd39c782370117a0c
SHA1:7aa5fc13cf2f811e645912646ace587059d6b024
SHA256:22de86536c93e4742e4a3bcaaa80c6ec1e3b139c3cab85c35949b3c53d085392
Tags:exeuser-4k95m
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • ValorantHack.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\ValorantHack.exe" MD5: A79B1017BBFE997CD39C782370117A0C)
    • rundll32.exe (PID: 6768 cmdline: "rundll32.exe" SystemCoreHelper.dll,GetCompiled MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ValorantHack.exeVirustotal: Detection: 25%Perma Link
Source: ValorantHack.exeJoe Sandbox ML: detected
Source: ValorantHack.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ValorantHack.exe, 00000000.00000002.1732725976.0000000002B2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ValorantHack.exe
Source: ValorantHack.exe, 00000000.00000000.1686459366.0000000002463000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDataSync.exe2 vs ValorantHack.exe
Source: ValorantHack.exeBinary or memory string: OriginalFilenameDataSync.exe2 vs ValorantHack.exe
Source: classification engineClassification label: mal52.winEXE@3/1@0/0
Source: C:\Users\user\Desktop\ValorantHack.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ValorantHack.exe.logJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeMutant created: NULL
Source: ValorantHack.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ValorantHack.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\ValorantHack.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled
Source: ValorantHack.exeVirustotal: Detection: 25%
Source: unknownProcess created: C:\Users\user\Desktop\ValorantHack.exe "C:\Users\user\Desktop\ValorantHack.exe"
Source: C:\Users\user\Desktop\ValorantHack.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled
Source: C:\Users\user\Desktop\ValorantHack.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiledJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: ValorantHack.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: ValorantHack.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: ValorantHack.exeStatic file information: File size 31469568 > 1048576
Source: ValorantHack.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e01600
Source: ValorantHack.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ValorantHack.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ValorantHack.exeStatic PE information: 0xFEB07701 [Thu May 28 18:14:25 2105 UTC]
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeMemory allocated: 4580000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeMemory allocated: 4770000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeMemory allocated: 6770000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe TID: 6804Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiledJump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exeQueries volume information: C:\Users\user\Desktop\ValorantHack.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
Virtualization/Sandbox Evasion
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Process Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ValorantHack.exe25%VirustotalBrowse
ValorantHack.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561388
Start date and time:2024-11-23 09:57:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ValorantHack.exe
Detection:MAL
Classification:mal52.winEXE@3/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Execution Graph export aborted for target ValorantHack.exe, PID 6748 because it is empty
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\ValorantHack.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):0.008615680233992307
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
  • Win32 Executable (generic) a (10002005/4) 49.97%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:ValorantHack.exe
File size:31'469'568 bytes
MD5:a79b1017bbfe997cd39c782370117a0c
SHA1:7aa5fc13cf2f811e645912646ace587059d6b024
SHA256:22de86536c93e4742e4a3bcaaa80c6ec1e3b139c3cab85c35949b3c53d085392
SHA512:94944427f4a7777ad9fa600b6aa4e54a25d7cd521477a0cc98835d4e4b90018fc8b3719991a9b00083f7c943e3211cf644269b9fc806b1a1b5d7eb528f5e9bcc
SSDEEP:384:OsDZPPwb/phw+SEuokwlwADoXYA/IXrXWXIAlDM6kYcV6qUiJFnh:OsDZPPwbYlP/IX6X/VQYcV69izh
TLSH:3C672B3193C48072C636463369129B011F7A9B7F7E1AD66B388C252F3FF26A1C263597
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w............"...0..............4... ...@....@.. ....................................`................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x220340e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xFEB07701 [Thu May 28 18:14:25 2105 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1e033bc0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e040000x1530.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e060000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x1e033a00x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x1e014140x1e016008e978ed0f31427642ba852f67bb78b5bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x1e040000x15300x160039a96387c2cb58d30f1ffb4268a53e0dFalse0.3860085227272727data5.399141143156293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1e060000xc0x2005dd2bc6804a9cc543f81b84b310bdaa6False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\340\001\014"0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x1e040900x360data0.4039351851851852
RT_MANIFEST0x1e044000x112aXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40259444697314517
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:03:58:08
Start date:23/11/2024
Path:C:\Users\user\Desktop\ValorantHack.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\ValorantHack.exe"
Imagebase:0x660000
File size:31'469'568 bytes
MD5 hash:A79B1017BBFE997CD39C782370117A0C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:03:58:08
Start date:23/11/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:"rundll32.exe" SystemCoreHelper.dll,GetCompiled
Imagebase:0x250000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1733157510.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_45d0000_ValorantHack.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bc978dade0c5999dd308080381bf66b2c48713fcefd37c05f224f8d52af3af88
    • Instruction ID: 41df4c5cbbcc191489d28f7a92029f5aea94615d00cc16dd3874f5dc547add6e
    • Opcode Fuzzy Hash: bc978dade0c5999dd308080381bf66b2c48713fcefd37c05f224f8d52af3af88
    • Instruction Fuzzy Hash: 0CC04C8A61DBC04FD712562458611C96F50FDA340C7CB08EBD1C49F553E1045B578272
    Memory Dump Source
    • Source File: 00000000.00000002.1733157510.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_45d0000_ValorantHack.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 244d6081704978524e79ecb96b7d9bfddce604aada6cefe13ee1b38d89d567b8
    • Instruction ID: c06a3e940ae1d708085dd7db821451e50b0aba17a30b74323662787aebb172ba
    • Opcode Fuzzy Hash: 244d6081704978524e79ecb96b7d9bfddce604aada6cefe13ee1b38d89d567b8
    • Instruction Fuzzy Hash: 9901D23060435ACFDF21DB68D8157DE7BB2FF44708F40082CD0416B292DBBA6849DBA2
    Memory Dump Source
    • Source File: 00000000.00000002.1733157510.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_45d0000_ValorantHack.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 013ab10b1e0bce5b661234817893ec3e9abbcab767aad15fdd674687998ee3ef
    • Instruction ID: e5ac50bd50d197f5ba897f4f2369093e21c922d82cdd67bfe49f79c2af194211
    • Opcode Fuzzy Hash: 013ab10b1e0bce5b661234817893ec3e9abbcab767aad15fdd674687998ee3ef
    • Instruction Fuzzy Hash: 88019E3060435A8FDF21DB68D81579E7BB2FF44708F000828D0426B292CBBA7848DBA1