Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Target
DXSDK_Jun10 (1).exe
Size
571.7MB
MD5
2af0c3791863ca873ef6d7d6a761d608
SHA1
495ad05ae5fc4ecd76b53a69a35bacb66d958608
SHA256
705271dc83bfee54d9b94e028426e288d5f070784b7446d164f48ecfbb2a02cb
SHA512
24e1e9bda319b780124b865f4640822cfc44e4d18fbdcc8456d48fe54081652ce4ddb63d3bd8596351057cbae50fc824b8297e99f0f7c97547153162562ba73f
SSDEEP
12582912:gv5NPFvCPOZ2Li8ftAxeEoyYxtWrYvw6d/FgH8TESf:ghNPRiy2pftUXoyYHWrD6tvTEo
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
dxsdkunpacker_asInvoker.pdb
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
LookupPrivilegeValueA
SetFileTime
VerifyVersionInfoA
VerSetConditionMask
MoveFileExA
GetVersionExA
lstrcatA
lstrcpyA
MultiByteToWideChar
GetWindowsDirectoryA
ExpandEnvironmentStringsA
SetFilePointer
CreateFileA
ReadFile
UnmapViewOfFile
MapViewOfFile
WriteFile
GetModuleFileNameA
GetTempFileNameA
CopyFileA
OutputDebugStringA
GetSystemDirectoryA
GetFileSize
SystemTimeToFileTime
GetLocalTime
InterlockedCompareExchange
lstrlenA
SetThreadLocale
GetDiskFreeSpaceExA
GetTempPathW
LoadLibraryExA
CreateEventA
GetTempPathA
CreateFileMappingA
OpenFileMappingA
CreateThread
MulDiv
IsDBCSLeadByte
GlobalFree
GlobalAlloc
CreateProcessA
FindClose
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcess
FindFirstFileA
GetFileAttributesA
GetUserDefaultUILanguage
IsBadReadPtr
SetErrorMode
GetPrivateProfileStringA
GetEnvironmentVariableA
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
HeapReAlloc
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStringTypeW
LoadLibraryW
HeapSize
Sleep
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetFileAttributesA
DeleteFileA
CreateDirectoryA
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetCurrentThread
RemoveDirectoryA
GetProcAddress
FreeLibrary
lstrcpynA
LoadLibraryA
GetLastError
CloseHandle
FindNextFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
HeapFree
DecodePointer
EncodePointer
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
InterlockedDecrement
CreateFontIndirectA
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetCharABCWidthsA
SelectObject
GetTextExtentPointA
DeleteObject
SetWindowTextA
LoadStringA
MessageBoxA
CharNextA
wsprintfA
EndDialog
GetDlgItem
SetDlgItemTextW
DialogBoxParamA
PostMessageA
LoadIconA
GetWindowTextA
LoadCursorA
SetCursor
SendDlgItemMessageA
LoadStringW
ExitWindowsEx
ShowWindow
PostQuitMessage
EnableWindow
SystemParametersInfoA
IsWindowEnabled
GetParent
GetWindowRect
SetWindowPos
GetWindowLongA
SetWindowLongA
GetDC
SendMessageA
GetClientRect
ReleaseDC
UpdateDriverForPlugAndPlayDevicesA
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
CM_Get_DevNode_Status
SetupDiSetDeviceRegistryPropertyA
SetupCopyOEMInfA
SHGetFolderPathA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteExA
PropertySheetA
ord17
CoInitializeEx
CoCreateInstance
CoUninitialize
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ