Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
WormholeInstaller.exe
Size
61.2MB
MD5
671ae680c497be881ab95d669a33167f
SHA1
1fc6067d6fd3fcf7a9a80be6e43f8261cc87c081
SHA256
409937e3ba0d90d437fe3ba078a5e0845a686c5e7ec937545c156f76b11900de
SHA512
7d8c99ae980d94361558b2b7144fba896803f0866e0ba0b94b0ef787b43a3b1436c16adfce691d0246975f14ccee12155a27979a596058e2b291b5844ccef2c3
SSDEEP
1572864:58AbpDV4nBukeaQ+tNy7AGYvxZek+7gzqR:3bpDaBuba9Ny7AMkd
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateMutexW
FreeResource
GlobalAlloc
CreateThread
GlobalLock
LocalFree
GlobalUnlock
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetTimeZoneInformation
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
ExpandEnvironmentStringsW
GetModuleHandleW
GetProcAddress
FindResourceW
Process32FirstW
LoadResource
LockResource
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
TerminateProcess
WriteFile
GetCurrentProcess
SizeofResource
GetExitCodeProcess
CreateProcessW
CloseHandle
DeleteFileW
ResumeThread
WaitForSingleObject
GetTempPathW
GetModuleFileNameA
GetEnvironmentStringsW
CreateDirectoryW
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetStdHandle
GetModuleFileNameW
RtlUnwind
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
GetLocaleInfoW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
LoadCursorW
LoadIconW
GetForegroundWindow
ExitWindowsEx
GetDlgCtrlID
SetCursor
GetDlgItem
KillTimer
DialogBoxParamW
PtInRect
SetTimer
ShowWindow
EndDialog
SendMessageW
ReleaseCapture
GetCursorPos
LoadStringW
wsprintfW
FillRect
MessageBoxW
GetDC
GetWindowRect
PostMessageW
ScreenToClient
SelectObject
CreateCompatibleDC
CreateFontW
GetStockObject
SetTextColor
SetBkMode
DeleteObject
BitBlt
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
StartServiceW
ChangeServiceConfigW
OpenServiceW
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
PathFileExistsW
PathAppendW
SHDeleteKeyW
GdipDisposeImage
GdiplusShutdown
GdipCloneImage
GdipCreateBitmapFromStream
GdipLoadImageFromStream
GdipDeleteGraphics
GdipCreateFromHDC
GdipFree
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipDrawImageRectI
GdiplusStartup
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ