Static task
static1
Behavioral task
behavioral1
Sample
valorant_22.45_15.03.2023 - Copy (3).exe
Resource
win10v2004-20230221-en
General
-
Target
valorant_22.45_15.03.2023 - Copy (3).exe
-
Size
13.7MB
-
MD5
daf412224e746805703f69fe43c20cf3
-
SHA1
4497454f83ad3a7955126ef1049ec2bb9b386fb8
-
SHA256
5bb7b6b47b805214cca7cbd4a7bd6f8c1913661c9b68c304ce09ee0a7e78fb6b
-
SHA512
298d299f0d966a4dee06f563a56b27b2bb9953d9f924beeba2724dcbf2402d55c175634f10181ee321d2cf9307ddd930e7f64412b59628dbd581a92b52cdef65
-
SSDEEP
196608:prPRgw4ZoHHSqgIp/VdUUlV2teYBvKluQGNgOLHJlgUSB8k5DR//S9ohCI5CX/g6:3gwmqPT3V+v0XEgeeGkRpQNI5CXh
Malware Config
Signatures
Files
-
valorant_22.45_15.03.2023 - Copy (3).exe.exe windows x64
1c9e07af67348622700778228d2e8f08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_0 Size: - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_2 Size: 13.6MB - Virtual size: 13.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ