daemonprocess.exe

Beijing AmazGame Age Internet Technology Co., Ltd.

The application daemonprocess.exe by Beijing AmazGame Age Internet Technology Co. has been detected as a potentially unwanted program by 2 anti-malware scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘mobilegeni daemon’. This file is typically installed with the program Mobogenie by Beijing Yang Fan Jing He Information Consulting Co. Ltd..
Publisher:

MD5:
f25cd59da3b2efe7df4a8baf38f8eedd

SHA-1:
fa514cfd3e5723dab7d11540faca8cbe0599849d

SHA-256:
a0e12693bbab2b81bc75063a12d714d454104a67c1e65970abc1aaef883fca0e

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 10:25:51 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Mobogenie (variant)
8.9477

Reason Heuristics
PUP.Optional.BeijingAmazGameAgeInternetTechnologyCo.N
14.3.2.16

File size:
750.2 KB (768,192 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\mobogenie\daemonprocess.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/16/2012 2:00:00 AM

Valid to:
6/16/2015 2:59:59 AM

Subject:
CN="Beijing AmazGame Age Internet Technology Co., Ltd.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Beijing AmazGame Age Internet Technology Co., Ltd.", L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
22CF7DA7B76FC5C4E77225CFA1BDA497

File PE Metadata
Compilation timestamp:
2/26/2014 10:22:38 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:cXU8ESDIwfIyrnbCw2jJXMD8dqA3/IPkpU+41jmNSn46D3jHtfHp8jMERb:cXUaQdXMIWPkUjmKjHtfHp8AERb

Entry address:
0x83E7F

Entry point:
E8, 5F, 05, 00, 00, E9, B3, FD, FF, FF, CC, CC, CC, CC, CC, CC, CC, 80, F9, 40, 73, 15, 80, F9, 20, 73, 06, 0F, A5, C2, D3, E0, C3, 8B, D0, 33, C0, 80, E1, 1F, D3, E2, C3, 33, C0, 33, D2, C3, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8...
 
[+]

Code size:
563.5 KB (577,024 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
mobilegeni daemon

Command:
C:\Program Files\mobogenie\daemonprocess.exe


The file daemonprocess.exe has been discovered within the following program.

Mobogenie  by Beijing Yang Fan Jing He Information Consulting Co. Ltd.
Mobogenie is an Android app store portal that may use the OpenCandy, Quick Downloader, Conduit and various other monetization programs to bundle with third party installers. In many cases some versions (mostly older ones) are bundled by third party distribution platforms.
www.mobogenie.com/pc.html
56% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

Remove daemonprocess.exe - Powered by Reason Core Security