Gridinsoft Logo

Apmwinsrv.exe Trojan Packed Analysis

Technical Analysis

File Name apmwinsrv.exe
File Type
PE32+ executable (GUI) x86-64, for MS Windows
Scanner Version 1.0.178.174
Database Version 2024-06-02 17:00:37 UTC

Trojan.Win64.Packed.sa

Malware family: Packed

Packed malware uses compression, encryption, or obfuscation techniques to alter code appearance and evade security detection. These methods modify the original malware structure to bypass signature-based detection systems and complicate analysis efforts.
N/A
Detection Rate
4,459,008
File Size (bytes)
2024-06-02
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
3c507dd648eda90e32f42b96fac7472c
SHA1
0cce7d103a1250e96c1eb0629913ca6d952d390e
SHA256
930823f23a2f17ead35da005525ce620e4a8664bcc4b3e91c3163744b3a95bcf
SHA512
ba7f57c4e17f3abe861519bdef303354173a5369b054b4b126cb8b545cf19944c98deae663d3c67591ea83e1696b4e66512b2765f6c13acf26e269e7520c37f7
ImpHash
a065bdbb0f82a50b009dc4ed3265cebd

PE Analysis

Basic Information

Image Base 0x140000000
Entry Point 0x140591dd9
Compilation Time 2023-11-08 07:34:40
Checksum 0x0044ad01 (Actual: 0x0044ad01)
OS Version 6.0
PEiD Signatures PE32+ executable (GUI) x86-64, for MS Windows
PDB Path F:\BuildAgent\work\c62d884872386c49\fs_for_win\hfs4win\HFS4WinService\HFS4WINService\x64\Release\apmwinsrv.pdb
Digital Signature The PE file does not contain a certificate table.
Imports 9 libraries
CRYPT32, KERNEL32, USER32, ADVAPI32, ole32, OLEAUT32, WINHTTP, WS2_32, bcrypt
Exports 0 functions
Resources 2 Resources
Sections 10 Sections

Version Information

CompanyName Paragon Software
FileDescription HFS+ for Windows by Paragon Software service
InternalName apmwinsrv.exe
LegalCopyright Copyright (C) 2019
OriginalFilename apmwinsrv.exe
ProductName HFS+ for Windows by Paragon Software
ProductVersion
Translation 0x0419 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 2,195,458 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.rdata 0x0021a000 947,076 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.data 0x00302000 44,300 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.pdata 0x0030d000 133,236 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.gfids 0x0032e000 4,000 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.tls 0x0032f000 9 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.vmp0 0x00330000 1,382,817 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ D41D8CD98F00B204E9800998ECF8427E
.vmp1 0x00482000 4,455,580 bytes 4,455,936 bytes 7.83 (Packed/Encrypted) IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ D81A96E6E431E191A9C809A2D2B4CEE4
.reloc 0x008c2000 200 bytes 512 bytes 1.91 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 38C2AC3E829239E075FBBE53577F4211
.rsrc 0x008c3000 1,309 bytes 1,536 bytes 3.73 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 01887FC12E0A51DC4F8DF8274505C169
Entropy Analysis Alert

1 section(s) with high entropy (≥7.5) detected - possible packing/encryption

Resource Analysis

Total Resources: 2 (1,149 bytes)
Resource Type Count Total Size Percentage
RT_VERSION 1 768 bytes
66.8%
RT_MANIFEST 1 381 bytes
33.2%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

The PE file does not contain a certificate table.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Win64.Packed.sa Removal

Gridinsoft has the capability to identify and eliminate Trojan.Win64.Packed.sa without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware