Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
PlantsVsZombiesSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PlantsVsZombiesSetup.exe
Resource
win10v2004-20240802-en
Target
PlantsVsZombiesSetup.exe
Size
40.8MB
MD5
057e320bc966a1f81427911db659cc7c
SHA1
d7d688897c6cb402f4efbefaa7f6a549a83eda3d
SHA256
f98b6c389a52fdc925071450a021ec9588286ccccbe5252634493b5452ea6a5d
SHA512
c8992512a716deb52c97ba5a12cbb49f9f8ddda2c215ffe19007fc63d4281e64e3ade515bd547099eca4053fb44b7e6db7bbd24a4f179fc514dc8010b70e151f
SSDEEP
786432:kd6TDBpyugcYBtWSMJdLfez3mAz6rzUcRI7kqxU0zUA:kd6TvgpLTMJhfebm+6Ecikh0oA
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetDiskFreeSpaceA
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
LocalFree
DeleteFileA
CreateThread
LoadLibraryW
InterlockedDecrement
FindFirstFileW
LoadLibraryExW
FindClose
FindNextFileW
ExpandEnvironmentStringsW
lstrlenA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetProcessHeap
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
GetFileAttributesA
IsValidCodePage
GetOEMCP
GetACP
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetHandleCount
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
GetFileType
VirtualAlloc
VirtualFree
HeapCreate
GetStringTypeW
ResetEvent
CopyFileA
GetProcAddress
GetLastError
CreateDirectoryA
MultiByteToWideChar
MulDiv
GetExitCodeProcess
CreateEventA
Sleep
TerminateThread
OpenProcess
GetWindowsDirectoryA
SetEvent
WaitForSingleObject
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
GetSystemDirectoryA
WideCharToMultiByte
LocalFileTimeToFileTime
CloseHandle
SetFileAttributesA
SetFileTime
CreateFileA
DosDateTimeToFileTime
LCMapStringA
LCMapStringW
GetCPInfo
RaiseException
RemoveDirectoryA
HeapReAlloc
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
GetModuleHandleW
ResumeThread
ExitThread
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FindNextFileA
FindFirstFileA
CreateFileW
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
ReleaseDC
EndDeferWindowPos
DestroyIcon
SetWindowTextW
DialogBoxParamA
EnableWindow
LoadStringW
SetWindowLongA
CharLowerA
EndPaint
GetClassNameA
SetTimer
GetWindowRect
SendDlgItemMessageA
FillRect
DrawTextW
KillTimer
DrawTextA
DrawIconEx
DialogBoxParamW
GetClientRect
SendMessageA
MapWindowPoints
BeginPaint
GetDC
DrawFocusRect
GetWindowTextA
GetWindowLongA
GetWindowTextW
CreateWindowExA
GetClassNameW
RegisterWindowMessageA
IsWindowUnicode
GetDlgItem
EndDialog
GetDesktopWindow
GetSysColor
SetWindowPos
EnumChildWindows
ShowWindow
GetSysColorBrush
IsDlgButtonChecked
IsWindow
PostMessageA
AdjustWindowRectEx
DeferWindowPos
MessageBoxW
BeginDeferWindowPos
GetSystemMetrics
SetWindowTextA
LoadImageA
SendMessageW
GetTextExtentPoint32W
SetTextColor
DeleteDC
CreateFontA
GetDeviceCaps
SetBkColor
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateFontW
GetTextMetricsA
GetObjectA
GetStockObject
CreateSolidBrush
BitBlt
RegOpenKeyA
SaferCloseLevel
RegDeleteKeyA
SaferComputeTokenFromLevel
RegCloseKey
SaferCreateLevel
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
CreateProcessAsUserA
SHChangeNotify
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListW
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
SHBrowseForFolderW
CoInitialize
CoUninitialize
StringFromGUID2
CoInitializeSecurity
CoCreateGuid
CoCreateInstance
SysFreeString
SysAllocString
VariantInit
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ