Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
BlackholeInstaller.exe
Size
62.9MB
MD5
14660b7d9aed8db7e7691bad212858f0
SHA1
6ee7e7ea6b79333e6551fed8182d13ee7fdb94e0
SHA256
44151743f8ab0feb4b95729759d625d928f60089aede502e8bc7c89f1e16687b
SHA512
a75c29f3be4c28815665686d2ae3ca1986f16076e5afe8a677251df95391c5d66f920b2a59b0148a86376d8a40053a301fa0024dae4fb78992a2b737399443a5
SSDEEP
1572864:QEV+osH1s+R51o2Px32b8xhv/99EfUHc5NRz:x+osVr3M8xhX99oUHyP
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Wormhole\installer\x64\Release\BlackholeInstaller.pdb
CreateMutexW
FreeResource
GlobalAlloc
CreateThread
GlobalLock
LocalFree
GlobalUnlock
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetTimeZoneInformation
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
ExpandEnvironmentStringsW
GetModuleHandleW
GetProcAddress
FindResourceW
Process32FirstW
LoadResource
LockResource
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
TerminateProcess
WriteFile
GetCurrentProcess
SizeofResource
GetExitCodeProcess
CreateProcessW
CloseHandle
DeleteFileW
ResumeThread
WaitForSingleObject
GetTempPathW
GetModuleFileNameA
GetEnvironmentStringsW
CreateDirectoryW
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetStdHandle
GetModuleFileNameW
RtlUnwind
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
GetLocaleInfoW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
LoadCursorW
LoadIconW
GetForegroundWindow
ExitWindowsEx
GetDlgCtrlID
SetCursor
GetDlgItem
KillTimer
DialogBoxParamW
PtInRect
SetTimer
ShowWindow
EndDialog
SendMessageW
ReleaseCapture
GetCursorPos
LoadStringW
wsprintfW
FillRect
MessageBoxW
GetDC
GetWindowRect
PostMessageW
ScreenToClient
SelectObject
CreateCompatibleDC
CreateFontW
GetStockObject
SetTextColor
SetBkMode
DeleteObject
BitBlt
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
StartServiceW
ChangeServiceConfigW
OpenServiceW
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
PathFileExistsW
PathAppendW
SHDeleteKeyW
GdipDisposeImage
GdiplusShutdown
GdipCloneImage
GdipCreateBitmapFromStream
GdipLoadImageFromStream
GdipDeleteGraphics
GdipCreateFromHDC
GdipFree
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipDrawImageRectI
GdiplusStartup
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ