PUP.PC Shower 2014

Threat Scorecard

Popularity Rank: 23,208
Threat Level: 10 % (Normal)
Infected Computers: 118
First Seen: March 27, 2019
Last Seen: April 27, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove PUP.PC Shower 2014

File System Details

PUP.PC Shower 2014 may create the following file(s):
# File Name MD5 Detections
1. PC-Shower.exe 25184dcd382ad209b9b3a0e25046b870 27

Analysis Report

General information

Family Name: PUP.PC Shower 2014
Signature status: Root Not Trusted

Known Samples

MD5: 74b3d957109158d026efbf59b445f6a2
SHA1: 23f6d5b8d83f36bd9e0acf88e5410f6fa8e33b57
SHA256: CCBBDE2225B1EF4223E9C5004B04D735670C2F822DD1519F83F8E8BC12FE1A7C
File Size: 8.60 MB, 8601024 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name Arafasoft, Inc.
File Description PC Shower 2012 Setup
Product Name PC Shower 2012

Digital Signatures

Signer Root Status
Wael Arafa UTN-USERFirst-Object Root Not Trusted

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-fs8h9.tmp\23f6d5b8d83f36bd9e0acf88e5410f6fa8e33b57_0008601024.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Onwnggbj\AppData\Local\Temp\is-FS8H9.tmp\23f6d5b8d83f36bd9e0acf88e5410f6fa8e33b57_0008601024.tmp" /SL5="$403A0,8274759,76288,c:\users\user\downloads\23f6d5b8d83f36bd9e0acf88e5410f6fa8e33b57_0008601024"

Trending

Most Viewed

Loading...