Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
WormholeInstaller.exe
Resource
win11-20240802-en
Target
WormholeInstaller.exe
Size
62.9MB
MD5
944162e2e6d19956511ff9efb52a95f0
SHA1
a28d8da5e7dd6ecb862d3d803479717f8d30d6b4
SHA256
e02dad62e199edcd40052bbce94d76da46365735678dfa361b21f63991c72704
SHA512
424cd1d55615c7f782264c61933a4103b52f4f237efaa39505597e4cf406b9fe381307c7cf5d6de8721d5ab0a7a3291cb240dc8dc418a07088f9c2978c110623
SSDEEP
1572864:dyYopDV4nBukeaQ+tNy7AQUo68S4ZPERD:dYpDaBuba9Ny7AK5S4ZP2
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Wormhole\installer\x64\Release\WormholeInstaller.pdb
CreateMutexW
FreeResource
GlobalAlloc
CreateThread
GlobalLock
LocalFree
GlobalUnlock
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetTimeZoneInformation
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
ExpandEnvironmentStringsW
GetModuleHandleW
GetProcAddress
FindResourceW
Process32FirstW
LoadResource
LockResource
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
TerminateProcess
WriteFile
GetCurrentProcess
SizeofResource
GetExitCodeProcess
CreateProcessW
CloseHandle
DeleteFileW
ResumeThread
WaitForSingleObject
GetTempPathW
GetModuleFileNameA
GetEnvironmentStringsW
CreateDirectoryW
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetStdHandle
GetModuleFileNameW
RtlUnwind
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
GetLocaleInfoW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
LoadCursorW
LoadIconW
GetForegroundWindow
ExitWindowsEx
GetDlgCtrlID
SetCursor
GetDlgItem
KillTimer
DialogBoxParamW
PtInRect
SetTimer
ShowWindow
EndDialog
SendMessageW
ReleaseCapture
GetCursorPos
LoadStringW
wsprintfW
FillRect
MessageBoxW
GetDC
GetWindowRect
PostMessageW
ScreenToClient
SelectObject
CreateCompatibleDC
CreateFontW
GetStockObject
SetTextColor
SetBkMode
DeleteObject
BitBlt
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
StartServiceW
ChangeServiceConfigW
OpenServiceW
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
PathFileExistsW
PathAppendW
SHDeleteKeyW
GdipDisposeImage
GdiplusShutdown
GdipCloneImage
GdipCreateBitmapFromStream
GdipLoadImageFromStream
GdipDeleteGraphics
GdipCreateFromHDC
GdipFree
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipDrawImageRectI
GdiplusStartup
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ