This is trying to circumvent windows product activation c:\WINDOWS\system32\antiwpa.dll and there are often accompanied by something unwanted.
So if you installed this trying to avoid product activation you could be inviting along guests.
The (PUM.Disabled.SecurityCenter) Potentially Unwanted Modification (PUM part) essentially mean the registry has been modified to block notification if your firewall, AV or windows update are disabled. Essentially these should be reversed, e.g. running MBAM again and selecting Remove selected.
The (Malware.Packer) .exe files should be sent to avast, see ~~~~ below.
This is the one that is doing the hiding, a rootkit, c:\WINDOWS\system32\drivers\str.sys (Rootkit.Agent). This one is essential to send to avast as that has been hiding what otherwise might have been detected by avast.
~~~~
Send the sample/s to avast as a Undetected Malware:
Open the chest and right click in the Chest and select Add, navigate to where you have the sample and add it to the chest (see image). Once in the chest, right click on the file and select 'Submit to virus lab...' complete the form and submit, the file will be uploaded during the next update.
Or
Send the sample to virus (at) avast (dot) com zipped and password protected with the password in email body, a link to this topic might help and undetected malware in the subject.
####
Once you have sent the samples to avast, run MBAM again and this time allow MBAM to deal with the detections (Remove Selected, image1)
Then Run an avast scan again and the SAS scan and post the results.