What is PWRISOSH.DLL?

PWRISOSH.DLL is part of PowerISO Shell Dynamic Link Library and developed by Power Software Ltd according to the PWRISOSH.DLL version information.

PWRISOSH.DLL's description is "PowerISOShell DLL"

PWRISOSH.DLL is digitally signed by Power Software Limited.

PWRISOSH.DLL is usually located in the 'C:\Program Files\PowerISO\' folder.

Some of the anti-virus scanners at VirusTotal detected PWRISOSH.DLL.

If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.

Vendor and version information [?]

The following is the available information on PWRISOSH.DLL:

PropertyValue
Product namePowerISO Shell Dynamic Link Library
Company namePower Software Ltd
File descriptionPowerISOShell DLL
Internal namePowerISOShell
Original filenamePWRISOSH.DLL
Commentshttp://www.poweriso.com
Legal copyrightCopyright (C) 2004-2019
Product version7, 5, 0, 0
File version7, 5, 0, 0

Here's a screenshot of the file properties when displayed by Windows Explorer:

Product namePowerISO Shell Dynamic Link Library
Company namePower Software Ltd
File descriptionPowerISOShell DLL
Internal namePowerISOShell
Original filenamePWRISOSH.DLL
Commentshttp://www.poweriso.com
Legal copyrightCopyright (C) 2004-2019
Product version7, 5, 0, 0
File version7, 5, 0, 0

Digital signatures [?]

PWRISOSH.DLL has a valid digital signature.

PropertyValue
Signer namePower Software Limited
Certificate issuer nameVeriSign Class 3 Code Signing 2010 CA
Certificate serial number38ccc270ec2e13e9590e3dcf982e8c6b

VirusTotal report

2 of the 70 anti-virus programs at VirusTotal detected the PWRISOSH.DLL file. That's a 3% detection rate.

ScannerDetection Name
Bkav W64.HfsAdware.D281
Microsoft PUA:Win32/InstallCore
2 of the 70 anti-virus programs detected the PWRISOSH.DLL file.

Sandbox Report

The following information was gathered by executing the file inside Cuckoo Sandbox.

Summary

Successfully executed process in sandbox.

Summary

{
    "dll_loaded": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll",
        "UxTheme.dll",
        "imm32.dll"
    ],
    "file_opened": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll"
    ],
    "command_line": [
        "\"C:\\Windows\\System32\\rundll32.exe\" C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll,DllMain"
    ],
    "file_exists": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll.manifest"
    ],
    "file_failed": [
        "\\??\\scdbus0",
        "\\??\\SCDEmuDev0",
        "\\??\\scdbus"
    ],
    "file_read": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll"
    ],
    "regkey_read": [
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\OLE\\PageAllocatorSystemHeapIsPrivate",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\OLE\\PageAllocatorUseSystemHeap"
    ]
}

Generic

[
    {
        "process_path": "C:\\Windows\\System32\\rundll32.exe",
        "process_name": "rundll32.exe",
        "pid": 2336,
        "summary": {
            "file_failed": [
                "\\??\\scdbus0",
                "\\??\\SCDEmuDev0",
                "\\??\\scdbus"
            ],
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll.manifest"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\OLE\\PageAllocatorSystemHeapIsPrivate",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\OLE\\PageAllocatorUseSystemHeap"
            ],
            "dll_loaded": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll",
                "UxTheme.dll",
                "imm32.dll"
            ]
        },
        "first_seen": 1576291985.8125,
        "ppid": 2740
    },
    {
        "process_path": "C:\\Windows\\SysWOW64\\rundll32.exe",
        "process_name": "rundll32.exe",
        "pid": 2740,
        "summary": {
            "dll_loaded": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll"
            ],
            "file_opened": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll"
            ],
            "command_line": [
                "\"C:\\Windows\\System32\\rundll32.exe\" C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll,DllMain"
            ],
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll.manifest"
            ],
            "file_read": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\99eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494.bin.dll"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles"
            ]
        },
        "first_seen": 1576291985.640625,
        "ppid": 1664
    },
    {
        "process_path": "C:\\Windows\\System32\\lsass.exe",
        "process_name": "lsass.exe",
        "pid": 476,
        "summary": {},
        "first_seen": 1576291985.34375,
        "ppid": 376
    }
]

Signatures

[
    {
        "markcount": 1,
        "families": [],
        "description": "The file contains an unknown PE resource name possibly indicative of a packer",
        "severity": 1,
        "marks": [
            {
                "category": "resource name",
                "ioc": "AVI",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_unknown_resource_name"
    }
]

Yara

The Yara rules did not detect anything in the file.

Network

{
    "tls": [],
    "udp": [
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 662,
            "time": 6.186958074569702,
            "dport": 137,
            "sport": 137
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 5694,
            "time": 6.133336067199707,
            "dport": 5355,
            "sport": 51001
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6022,
            "time": 4.12160587310791,
            "dport": 5355,
            "sport": 53595
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6350,
            "time": 6.142912864685059,
            "dport": 5355,
            "sport": 53848
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6678,
            "time": 4.627691984176636,
            "dport": 5355,
            "sport": 54255
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 7006,
            "time": 3.015110969543457,
            "dport": 5355,
            "sport": 55314
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 7334,
            "time": 4.6546790599823,
            "dport": 1900,
            "sport": 1900
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 20274,
            "time": 4.157150983810425,
            "dport": 3702,
            "sport": 49152
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 28658,
            "time": 6.255776882171631,
            "dport": 1900,
            "sport": 53598
        }
    ],
    "dns_servers": [],
    "http": [],
    "icmp": [],
    "smtp": [],
    "tcp": [],
    "smtp_ex": [],
    "mitm": [],
    "hosts": [],
    "pcap_sha256": "c3341b6a977355fd15617d6ef6a34532b6828acd32d495011862d79316865516",
    "dns": [],
    "http_ex": [],
    "domains": [],
    "dead_hosts": [],
    "sorted_pcap_sha256": "6992bcb84146919669aac3984998a6adfe7fbc541bc475cbc3fe768e98edcf86",
    "irc": [],
    "https_ex": []
}

Screenshots

Screenshot from the sandboxScreenshot from the sandbox

PWRISOSH.DLL removal instructions

The instructions below shows how to remove PWRISOSH.DLL with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the PWRISOSH.DLL file for removal, restart your computer and scan it again to verify that PWRISOSH.DLL has been successfully removed. Here are the removal instructions in more detail:

  1. Download and install FreeFixer: http://www.freefixer.com/download.html
  2. Start FreeFixer and press the Start Scan button. The scan will finish in approximately five minutes.
    Screenshot of Start Scan button
  3. When the scan is finished, locate PWRISOSH.DLL in the scan result and tick the checkbox next to the PWRISOSH.DLL file. Do not check any other file for removal unless you are 100% sure you want to delete it. Tip: Press CTRL-F to open up FreeFixer's search dialog to quickly locate PWRISOSH.DLL in the scan result.
    Red arrow point on the unwanted file
    C:\Program Files\PowerISO\PWRISOSH.DLL
  4. Scroll down to the bottom of the scan result and press the Fix button. FreeFixer will now delete the PWRISOSH.DLL file.
    Screenshot of Fix button
  5. Restart your computer.
  6. Start FreeFixer and scan your computer again. If PWRISOSH.DLL still remains in the scan result, proceed with the next step. If PWRISOSH.DLL is gone from the scan result you're done.
  7. If PWRISOSH.DLL still remains in the scan result, check its checkbox again in the scan result and click Fix.
  8. Restart your computer.
  9. Start FreeFixer and scan your computer again. Verify that PWRISOSH.DLL no longer appear in the scan result.
Please select the option that best describe your thoughts on the removal instructions given above








Free Questionnaires

Other files also named PWRISOSH.DLL

PWRISOSH.DLL (9 votes)

Hashes [?]

PropertyValue
MD5bfbb746adaa498540bbcf247aae74f18
SHA25699eb9d1ec8fb7884985729ec17b972e802cafed788ffc02e56e0618a6f9de494

What will you do with PWRISOSH.DLL?

To help other users, please let us know what you will do with PWRISOSH.DLL:



Comments

Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.

I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.

No comments posted yet.

Leave a reply