PUP.Max Uninstaller

Threat Scorecard

Popularity Rank: 9,549
Threat Level: 10 % (Normal)
Infected Computers: 2,265
First Seen: March 31, 2019
Last Seen: April 10, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove PUP.Max Uninstaller

File System Details

PUP.Max Uninstaller may create the following file(s):
# File Name MD5 Detections
1. MaxUninstaller_Setup.exe e617e5874add4ba24d3dfc04fb03fbb3 270
2. ALMU.exe f7203d7283963ed24c78d586cc8cd0c4 249

Registry Details

PUP.Max Uninstaller may create the following registry entry or registry entries:
File name without path
max uninstaller.lnk
SOFTWARE\MU_FROM
SOFTWARE\WOW6432Node\MU_FROM

Directories

PUP.Max Uninstaller may create the following directory or directories:

%allusersprofile%\microsoft\windows\start menu\programs\max uninstaller
%programfiles%\max uninstaller
%programfiles(x86)%\max uninstaller

Analysis Report

General information

Family Name: PUP.Max Uninstaller
Signature status: Root Not Trusted

Known Samples

MD5: 431afe23e821425181d64e75f6a72640
SHA1: cf1c366b09d364482052f1c01acdf149310f0d37
SHA256: F7562E228B561FB73F2C067FEA3C1C4A2980D1141AE24B593CDA2444FBD12E9B
File Size: 245.98 KB, 245976 bytes
MD5: f1eb483d47bd1ec27cd312cf7a7762af
SHA1: 9896c412d952f7c5d17ef63e8e539d3f94ee6a8b
SHA256: 94C5CC2C613134CC3C910D957F7D88201612B464FEE26909C2976E205168005A
File Size: 6.65 MB, 6652760 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name
  • Advanced Fix, Inc.
  • TODO:
File Description
  • Advanced Fix 2013 Setup
  • TODO:
File Version
  • 2.1.3.83
  • 1.0.0.5
Internal Name CR.dll
Legal Copyright
  • Copyright (c) 2010 - 2013 Advanced Fix, Inc
  • TODO:
Original Filename CR.dll
Product Name Advanced Fix 2013
Product Version
  • 2.1.3.83
  • 1.0.0.5

Digital Signatures

Signer Root Status
Ideakee Inc UTN-USERFirst-Object Root Not Trusted

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-e47i6.tmp\9896c412d952f7c5d17ef63e8e539d3f94ee6a8b_0006652760.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-vk7ep.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-vk7ep.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\cf1c366b09d364482052f1c01acdf149310f0d37_0000245976.,LiQMAxHB
"C:\Users\Wypsgkfe\AppData\Local\Temp\is-E47I6.tmp\9896c412d952f7c5d17ef63e8e539d3f94ee6a8b_0006652760.tmp" /SL5="$40324,6147887,153600,c:\users\user\downloads\9896c412d952f7c5d17ef63e8e539d3f94ee6a8b_0006652760"

Trending

Most Viewed

Loading...