daemonprocess.exe

Beijing AmazGame Age Internet Technology Co., Ltd.

The application daemonprocess.exe by Beijing AmazGame Age Internet Technology Co. has been detected as a potentially unwanted program by 5 anti-malware scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘mobilegeni daemon’. This file is typically installed with the program Mobogenie by Beijing Yang Fan Jing He Information Consulting Co. Ltd..
Publisher:

MD5:
0a6e55fb7c79c89944d770fd0b907257

SHA-1:
e45c1d583bdd644f636d8da387761796ce1d7038

SHA-256:
9ccce22a428770d3fc2104ac397b732f2537fe7d4c816b6f4080cb1c28f8109c

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 7:32:40 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Mobogenie-O [Adw]
2014.9-140417

Dr.Web
Adware.Mobogenie.4
9.0.1.0187

ESET NOD32
Win32/Mobogenie (variant)
8.9803

G Data
Win32.Application.Mobogenie
14.4.24

Reason Heuristics
PUP.Optional.BeijingAmazGameAgeInternetTechnologyCo.N
14.4.17.9

File size:
731.2 KB (748,736 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\mobogenie\daemonprocess.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/16/2012 3:00:00 AM

Valid to:
6/16/2015 2:59:59 AM

Subject:
CN="Beijing AmazGame Age Internet Technology Co., Ltd.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Beijing AmazGame Age Internet Technology Co., Ltd.", L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
22CF7DA7B76FC5C4E77225CFA1BDA497

File PE Metadata
Compilation timestamp:
4/16/2014 11:14:33 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:WZVESRkdiZukbTkbW7Lk3UPyo46TY0XMSskrwfvkvXmbWoxogvhrfW5cOvj:WZFkdiZxkdUPywM4XmbWozhjW51

Entry address:
0x80A0F

Entry point:
E8, 62, 05, 00, 00, E9, B3, FD, FF, FF, CC, CC, CC, CC, CC, CC, CC, 80, F9, 40, 73, 15, 80, F9, 20, 73, 06, 0F, A5, C2, D3, E0, C3, 8B, D0, 33, C0, 80, E1, 1F, D3, E2, C3, 33, C0, 33, D2, C3, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8...
 
[+]

Entropy:
6.5910

Code size:
548.5 KB (561,664 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
mobilegeni daemon

Command:
C:\Program Files\mobogenie\daemonprocess.exe


The file daemonprocess.exe has been discovered within the following program.

Mobogenie  by Beijing Yang Fan Jing He Information Consulting Co. Ltd.
Mobogenie is an Android app store portal that may use the OpenCandy, Quick Downloader, Conduit and various other monetization programs to bundle with third party installers. In many cases some versions (mostly older ones) are bundled by third party distribution platforms.
www.mobogenie.com/pc.html
56% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to server-54-230-216-17.mrs50.r.cloudfront.net  (54.230.216.17:80)

TCP (HTTP):

TCP (HTTP):

Remove daemonprocess.exe - Powered by Reason Core Security