File details
File name: apsdaemon.exe
Name: Apple Push
Description: Apple Push
Version: 2.2.9.2
Size: 58.32 KB
Original file name: APSDaemon.exe
Digital certificate
Certificate authority:
VeriSign
Expiration date: 6/25/2013
Resource utilization
 | CPU utilization averages |
Total CPU: 0.0010977727%
Privileged CPU:
0.0005662358%

User CPU:
0.00053153685872%

Privileged CPU time: 686589.58 ms
Privileged CPU time /min: 3 ms
CPU cycle count:
176,081,726
CPU cycle count /min: 16,509,067
Context switches /sec:
5
 | Memory utilization averages |
Committed memory:
112.52 MB
Peak committed memory: 121.72 MB
Paged memory:
6.09 MB
Peak paged memory: 9.04 MB
Paged system memory:
202.3 KB
Non-paged system memory: 23.24 KB
Working set memory:
11.73 MB
Peak working set memory: 16.89 MB
Min working set memory: 11.32 MB
Private memory:
6.09 MB
Page faults:
7,652
Page faults /min: 41
 | Process I/O averages |
Total read operations:
282
Read operations /min: 1
Total read transfer: 398.47 KB
Read transfer /min: 1.46 KB
Total write operations:
49
Write operations /min: 1
Total write transfer: 6.5 KB
Write transfer /min: 41 Bytes
Total other operations:
119,417
Other operations /min: 260
Total other transfer: 3.26 MB
Other Transfer /min: 7.12 KB
 | GUI Object Averages |
GDI objects:
9
Peak GDI objects: 9
USER objects:
6
Peak USER objects: 8
Resources
Handle count average: 395
Thread count average: 12
Thread resource averages
wow64win.dll

Total CPU: 0.018638207790%
Privileged CPU: 0.018638207790%
User CPU: 0.000000000000%
CPU Cycle count /sec: 41,757
Module memory size: 360 KB
Total CPU: 0.002852523923%
Privileged CPU: 0.001262681275%
User CPU: 0.001589842648%
CPU Cycle count /sec: 23,131
Module memory size: 660 KB
Total CPU: 0.000898974163%
Privileged CPU: 0.000597865451%
User CPU: 0.000301108711%
CPU Cycle count /sec: 19,727
Module memory size: 52 KB
msvcr80.dll

Total CPU: 0.000893536145%
Privileged CPU: 0.000534790508%
User CPU: 0.000358745636%
CPU Cycle count /sec: 15,214
Module memory size: 620 KB
Process details
Runs as (owner): User
Integrety level: Medium
Windows platform: 64-bit
Parent Processes
Process Commands
"C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe" -Embedding
"C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
"C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
"C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe" -Embedding
Startup files (all users) run details
Name: APSDaemon
Command: "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
Network connectivity
UDP: LISTENING on port 52987
TCP: 17.149.36.198 on port 54905
UDP: LISTENING on port 59117
TCP: 17.149.36.154 on port 49204
UDP: LISTENING on port 62522
TCP: 17.149.36.147 on port 59564
UDP: LISTENING on port 49676
TCP: 17.149.32.11 on port 52887
UDP: LISTENING on port 53632
TCP: 17.172.232.116 on port 54789
UDP: LISTENING on port 63327
TCP: 17.149.32.34 on port 49326
Image hashes
MD5: 61e4289e91e88c90478d7f4beb10dcf7
SHA-1: cef0780b78d1cf2c2dbf1b6c6916bf7312ce1e23
SHA-256: 1d0f4034e0111cf5758f470c15a22a0a28eb8269cb5bf07222c9c0fb07a15c55
PE image details
Subsystem: Windows GUI
Langauge*: Microsoft Visual C++ 8.0
File packed: No
Import Table
advapi32.dll

RegCloseKey
RegCreateKeyW
RegOpenKeyExW
RegQueryValueExW
kernel32.dll

GetLastError
GetModuleFileNameW
GetEnvironmentVariableW
SetDllDirectoryW
GetFileAttributesW
WideCharToMultiByte
FreeEnvironmentStringsW
lstrlenW
CloseHandle
GetCommandLineW
GetCurrentThreadId
GetCurrentProcessId
LoadLibraryW
DebugBreak
GetProcAddress
SetUnhandledExceptionFilter
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetEnvironmentStringsW
OutputDebugStringA
LoadLibraryA
FreeLibrary
LocalAlloc
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RaiseException
msvcp80.dll
msvcr80.dll
shell32.dll

shlwapi.dll

PathFindExtensionW
PathRemoveFileSpecW
PathFindFileNameW