File Name | apmwinsrv.exe |
File Type |
PE32+ executable (GUI) x86-64, for MS Windows
|
Scanner Version | 1.0.178.174 |
Database Version | 2024-06-02 17:00:37 UTC |
Malware family: Packed
Hash Type | Value | Action |
---|---|---|
MD5 |
3c507dd648eda90e32f42b96fac7472c
|
|
SHA1 |
0cce7d103a1250e96c1eb0629913ca6d952d390e
|
|
SHA256 |
930823f23a2f17ead35da005525ce620e4a8664bcc4b3e91c3163744b3a95bcf
|
|
SHA512 |
ba7f57c4e17f3abe861519bdef303354173a5369b054b4b126cb8b545cf19944c98deae663d3c67591ea83e1696b4e66512b2765f6c13acf26e269e7520c37f7
|
|
ImpHash |
a065bdbb0f82a50b009dc4ed3265cebd
|
Image Base | 0x140000000 |
Entry Point | 0x140591dd9 |
Compilation Time | 2023-11-08 07:34:40 |
Checksum | 0x0044ad01 (Actual: 0x0044ad01) |
OS Version | 6.0 |
PEiD Signatures |
PE32+ executable (GUI) x86-64, for MS Windows
|
PDB Path | F:\BuildAgent\work\c62d884872386c49\fs_for_win\hfs4win\HFS4WinService\HFS4WINService\x64\Release\apmwinsrv.pdb |
Digital Signature | The PE file does not contain a certificate table. |
Imports |
9 libraries
CRYPT32, KERNEL32, USER32, ADVAPI32, ole32, OLEAUT32, WINHTTP, WS2_32, bcrypt |
Exports | 0 functions |
Resources | 2 Resources |
Sections | 10 Sections |
CompanyName | Paragon Software |
FileDescription | HFS+ for Windows by Paragon Software service |
InternalName | apmwinsrv.exe |
LegalCopyright | Copyright (C) 2019 |
OriginalFilename | apmwinsrv.exe |
ProductName | HFS+ for Windows by Paragon Software |
ProductVersion | |
Translation | 0x0419 0x04b0 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
2,195,458 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0021a000 |
947,076 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00302000 |
44,300 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.pdata |
0x0030d000 |
133,236 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.gfids |
0x0032e000 |
4,000 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.tls |
0x0032f000 |
9 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.vmp0 |
0x00330000 |
1,382,817 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.vmp1 |
0x00482000 |
4,455,580 bytes | 4,455,936 bytes | 7.83 (Packed/Encrypted) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D81A96E6E431E191A9C809A2D2B4CEE4 |
.reloc |
0x008c2000 |
200 bytes | 512 bytes | 1.91 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
38C2AC3E829239E075FBBE53577F4211 |
.rsrc |
0x008c3000 |
1,309 bytes | 1,536 bytes | 3.73 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
01887FC12E0A51DC4F8DF8274505C169 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_VERSION | 1 | 768 bytes | |
RT_MANIFEST | 1 | 381 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Win64.Packed.sa without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system