Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
License/Driver Booster 11 PRO License.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
License/Driver Booster 11 PRO License.exe
Resource
win10v2004-20240221-en
Target
Driver Booster 11 PRO.rar
Size
658KB
MD5
6d3ca847c423d6819dd364bd333572b6
SHA1
bfc6115fe0c41245f247d038737730fcd23c706d
SHA256
5961d0a8ebdc116b674d3231b5c8b01b35d3c7a191b0bb8ab5bb7b14352cc065
SHA512
eafe0185411812ea8ac561b2bf34a4f2551979252e1b42b1d045e523318c0de964c12c48aef7e8d91d667e836f3d3f2b7a3a62477a57440df25486cf9d92f102
SSDEEP
12288:vtSkbZjfeGDXtsLrWe6S4OqhECnTjRDMzNK0IFJWZZYbWhTkUuo:vzbgGDds+e74R7BAzPoUZqbW9kU7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
SetLastError
SystemTimeToFileTime
GetLocalTime
GetExitCodeThread
CreateThread
Sleep
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileAttributesW
GetTempPathW
MultiByteToWideChar
WideCharToMultiByte
CompareFileTime
FindClose
FindFirstFileW
CreateDirectoryW
ExpandEnvironmentStringsW
lstrlenA
lstrcmpW
GetSystemTimeAsFileTime
RemoveDirectoryW
FindNextFileW
DeleteFileW
GetEnvironmentVariableW
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
lstrcmpiW
LoadLibraryA
SetEnvironmentVariableW
GetModuleFileNameW
GetCommandLineW
GetModuleHandleW
GetTickCount
WriteFile
CreateFileW
GetDriveTypeW
SetFileAttributesW
LockResource
LoadResource
FindResourceA
MulDiv
GetSystemDirectoryW
ResumeThread
TerminateThread
SuspendThread
LocalFree
lstrcpyW
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualAlloc
VirtualFree
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
GetFileInformationByHandle
WaitForMultipleObjects
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
GetLastError
WaitForSingleObject
CloseHandle
GetProcAddress
lstrlenW
GetCurrentThreadId
UnhandledExceptionFilter
ShowWindow
ReleaseDC
DrawTextW
GetDC
ClientToScreen
DialogBoxIndirectParamW
MessageBeep
DrawIconEx
GetWindowDC
CallWindowProcW
DefWindowProcW
LoadIconW
IsWindow
GetWindowLongW
GetSystemMenu
wvsprintfW
GetDlgItem
GetSystemMetrics
GetKeyState
MessageBoxA
SetWindowTextW
GetParent
LoadImageW
GetWindow
SetWindowPos
SystemParametersInfoW
SetFocus
CallNextHookEx
EnableWindow
KillTimer
SendMessageW
EndDialog
wsprintfW
SetWindowLongW
SetWindowsHookExW
SetTimer
GetClientRect
EnableMenuItem
PtInRect
CharUpperW
GetWindowTextW
GetWindowTextLengthW
ScreenToClient
GetWindowRect
UnhookWindowsHookEx
CreateFontIndirectW
SelectObject
GetDeviceCaps
GetObjectW
DeleteObject
SHGetPathFromIDListW
SHGetMalloc
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
SHBrowseForFolderW
CoCreateInstance
CoInitializeEx
VariantClear
SysAllocStringLen
wcsncpy
_wcsnicmp
strncpy
memmove
wcsncmp
memcpy
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
__CxxFrameHandler3
_CxxThrowException
malloc
free
wcsstr
wcscmp
_beginthreadex
_except_handler3
_unlock
__dllonexit
_lock
_onexit
??1type_info@@UAE@XZ
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_controlfp
memset
_wtol
memcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ