PUP.PGWare Bundler

Threat Scorecard

Popularity Rank: 20,510
Threat Level: 10 % (Normal)
Infected Computers: 1,239
First Seen: November 13, 2020
Last Seen: February 15, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove PUP.PGWare Bundler

File System Details

PUP.PGWare Bundler may create the following file(s):
# File Name MD5 Detections
1. superram.exe 4142eb7bda9a9500ece8774d1cd3755e 30
2. Throttle-Setup.exe 4c8aedd802bce61def4600369f4b16bd 29
3. systemswift.exe f705a33f426f8a2fb60fb5baebf86f5c 25
4. pcswift.exe b1fac6873aa14cd9dba8af99be94b7de 19

Analysis Report

General information

Family Name: PUP.PGWare Bundler
Signature status: No Signature

Known Samples

MD5: c4789dc0202e2a740223163ebba8b1ad
SHA1: 6616931925c73b91d05a7d7fcdac1b546770a47a
SHA256: 4883A734EE0C21B5F62761C36FFA83999D82839B30392BA983D1EAAEBEAE270F
File Size: 6.00 MB, 5998494 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name PGWARE LLC
File Description SystemSwift Setup
File Version 1.0.0.1
Legal Copyright Copyright © 2015-2024 PGWARE LLC
Product Name SystemSwift
Product Version 1.0.0.1

File Traits

  • 2+ executable sections
  • Inno
  • InnoSetup Installer
  • Installer Manifest
  • Installer Version
  • VirtualQueryEx
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-aifrc.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-j4re2.tmp\6616931925c73b91d05a7d7fcdac1b546770a47a_0005998494.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Thjzwesc\AppData\Local\Temp\is-J4RE2.tmp\6616931925c73b91d05a7d7fcdac1b546770a47a_0005998494.tmp" /SL5="$40328,5037972,845824,c:\users\user\downloads\6616931925c73b91d05a7d7fcdac1b546770a47a_0005998494"

Trending

Most Viewed

Loading...