Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
CorelDRAWGraphicsSuiteX6Installer_ES32Bit.exe
Resource
win10-20230220-en
Target
CorelDRAWGraphicsSuiteX6Installer_ES32Bit.exe
Size
541.5MB
MD5
94f52eb57089fa287a4c4fd96f2c49e7
SHA1
55b44b91678b16f1471a0a462832c4b551853312
SHA256
b8a60ce2730a90a62b00ed1d3450c4d1b8bc7080be5898896b32e632ee5d2a0d
SHA512
5a3af842bdf3929721840f3aa8d18bd6c8acbcb849f3889e12c8a305627c45d3488433537d0fa72849994c17c0743f3c6e03cd6c3e27df26a9abd8d7467cdae1
SSDEEP
12582912:YFO0asv7NKFUOAyFde3fR97qY3BuIiuReRRfRxq4YRmeCIF:YFxhqA8eiY3BSuReHRxYQeCIF
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
lstrcpynA
lstrcmpiA
GetFileAttributesA
lstrcatA
FindClose
FindFirstFileA
IsBadReadPtr
UnmapViewOfFile
MapViewOfFile
GetSystemInfo
CreateFileMappingA
VirtualQuery
CompareStringA
CreateDirectoryA
CompareStringW
GetCurrentDirectoryA
ExpandEnvironmentStringsA
SetFileAttributesA
FileTimeToLocalFileTime
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
IsDBCSLeadByte
MoveFileExA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
WriteFile
lstrlenA
Sleep
CloseHandle
CreateProcessA
lstrlenW
GetDriveTypeA
FindResourceExA
GetPrivateProfileIntA
GetFileSize
SetFilePointer
CreateEventA
QueryPerformanceFrequency
ReleaseMutex
GetSystemDefaultLangID
CreateMutexA
SetErrorMode
LoadLibraryA
FreeLibrary
GetDiskFreeSpaceA
VerLanguageNameA
ReadFile
GetTickCount
GetCommandLineA
ExitThread
CreateThread
GetExitCodeProcess
FreeResource
MulDiv
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
GetLocaleInfoA
GetWindowsDirectoryA
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
GetTempPathA
GetVersionExA
CreateFileA
GlobalFree
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
GetSystemDirectoryA
SetCurrentDirectoryA
WaitForSingleObject
ExitProcess
GetCurrentProcess
lstrcpyA
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
GetLastError
SetLastError
DeleteFileA
RemoveDirectoryA
MultiByteToWideChar
WideCharToMultiByte
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
FindNextFileA
HeapSize
LCMapStringW
LCMapStringA
TlsGetValue
lstrcmpA
SystemTimeToFileTime
QueryPerformanceCounter
SetEvent
ResetEvent
SearchPathA
VirtualProtect
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
GetVersion
GetCurrentProcessId
InitializeCriticalSection
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
HeapReAlloc
RaiseException
RtlUnwind
DeleteCriticalSection
InterlockedExchange
GetTempFileNameA
OpenProcess
CompareFileTime
GetProcessTimes
TerminateProcess
GetLocalTime
GetTimeFormatA
GetDateFormatA
CharUpperA
DialogBoxIndirectParamA
WaitForInputIdle
SetActiveWindow
SetForegroundWindow
SetWindowLongA
SetWindowTextA
SendMessageA
GetDlgItem
LoadIconA
EndDialog
MoveWindow
GetWindowRect
wsprintfA
MessageBoxA
SetFocus
BeginPaint
LoadStringA
FillRect
EndPaint
GetMessageA
DefWindowProcA
GetWindow
SystemParametersInfoA
GetSystemMetrics
MapWindowPoints
GetPropA
EnableMenuItem
SetPropA
RemovePropA
GetSysColor
LoadImageA
GetDC
ReleaseDC
CreateDialogParamA
GetParent
GetWindowTextA
IsWindowVisible
CreateDialogIndirectParamA
GetDesktopWindow
ExitWindowsEx
RegisterClassExA
InvalidateRect
IntersectRect
EnumChildWindows
GetWindowDC
GetDlgItemTextA
CreateWindowExA
UpdateWindow
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
DrawFocusRect
InflateRect
DrawTextA
CopyRect
GetClientRect
IsWindowEnabled
FindWindowExA
IsDialogMessageA
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
EnableWindow
ShowWindow
SendDlgItemMessageA
PostMessageA
ScreenToClient
SetWindowPos
IsWindow
DestroyWindow
GetWindowLongA
SetDlgItemTextA
SetBkMode
SetTextColor
TextOutA
RestoreDC
SetBkColor
CreateSolidBrush
UnrealizeObject
SelectPalette
RealizePalette
BitBlt
CreateCompatibleDC
SelectObject
GetDIBColorTable
GetSystemPaletteEntries
CreatePalette
DeleteDC
CreateHalftonePalette
GetDeviceCaps
TranslateCharsetInfo
GetObjectA
CreateFontIndirectA
DeleteObject
DeleteMetaFile
CreateCompatibleBitmap
CreateDCA
GetStockObject
GetTextExtentPoint32A
CreatePatternBrush
CreateDIBitmap
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
CreateRectRgn
SetPixel
PatBlt
PlayMetaFile
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetMapMode
SaveDC
SetSecurityDescriptorGroup
RegCreateKeyExA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegEnumKeyA
RegEnumKeyExA
RegDeleteKeyA
RegEnumValueA
RegQueryValueExA
RegDeleteValueA
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
RegSetValueExA
SetSecurityDescriptorDacl
RegOpenKeyExA
RegCloseKey
ShellExecuteExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CoInitialize
CoUninitialize
CoInitializeSecurity
VariantChangeType
VariantClear
GetErrorInfo
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
SysReAllocStringLen
LZOpenFileA
LZCopy
LZClose
ord87
ord168
ord8
ord136
ord141
UuidToStringA
RpcStringFreeA
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ