geniecleaner.exe

Genie Cleaner

LeCheng(beijing) Technology Development Co.Ltd.

The application geniecleaner.exe by LeCheng(beijing) Technology Development Co.Ltd has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address 230.28.211.130.bc.googleusercontent.com on port 80 using the HTTP protocol.
Publisher:
Oppoos.com  (signed by LeCheng(beijing) Technology Development Co.Ltd.)

Product:
Genie Cleaner

Version:
1.0.0.2

MD5:
f2f63f67f3b20cf18a40ee9ae31b6500

SHA-1:
35f00d0799c188c15b5b69832266aa79518566d0

SHA-256:
46ef3620765419b03549ba7bd88ddbe646692428b4a31b1929340a7d93019a79

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 5:03:32 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Mobogenie.42
9.0.1.05190

Reason Heuristics
PUP.Mobogenie (L)
17.2.22.8

File size:
766.6 KB (785,048 bytes)

Product version:
1.0.0.2

Copyright:
Copyright (C) 2014 LeCheng(beijing) Technology Development Co.Ltd., All rights reserved.

Original file name:
Genie Cleaner

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\Program Files\genie soft\genie cleaner\geniecleaner.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/16/2014 5:30:00 AM

Valid to:
12/17/2015 5:29:59 AM

Subject:
CN=LeCheng(beijing) Technology Development Co.Ltd., OU=IT, O=LeCheng(beijing) Technology Development Co.Ltd., L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
09D77BAEB0E0B5305E9A26629BCF675B

File PE Metadata
Compilation timestamp:
2/6/2015 9:01:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:esrOSAzYc0cfp0itgWYDxsfL6I9cxpyXthfSCdI9IE7ZDG10LjMmxdwPcrSd+Clv:eJ/zYc0cKitgbxO6OcxpyXthqxIE7ZDm

Entry address:
0x8C254

Entry point:
E8, 2A, 04, 00, 00, E9, 6B, FD, FF, FF, FF, 25, 3C, 44, 49, 00, FF, 25, 40, 44, 49, 00, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 34, A0, 4A, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 50, BF, 4A, 00, 89, 0D, 4C, BF, 4A, 00, 89, 15, 48, BF, 4A, 00, 89, 1D, 44, BF, 4A, 00, 89...
 
[+]

Entropy:
6.7390

Code size:
586 KB (600,064 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):
Connects to 230.28.211.130.bc.googleusercontent.com  (130.211.28.230:80)

TCP (HTTP):
Connects to 91.220.197.104.bc.googleusercontent.com  (104.197.220.91:80)

TCP (HTTP):

TCP (HTTP):
Connects to server-54-192-203-234.fra50.r.cloudfront.net  (54.192.203.234:80)

TCP (HTTP SSL):
Connects to familysearch.yandex.ru  (213.180.193.56:443)

TCP (HTTP):
Connects to server-54-230-95-80.fra2.r.cloudfront.net  (54.230.95.80:80)

TCP (HTTP):
Connects to server-52-85-63-79.lhr50.r.cloudfront.net  (52.85.63.79:80)

TCP (HTTP):
Connects to 41.254.37.30.static.ltt.ly  (41.254.37.30:80)

TCP (HTTP):
Connects to static-ip-188-138-17-135.inaddr.ip-pool.com  (188.138.17.135:80)

TCP (HTTP):
Connects to server-54-239-132-69.sfo9.r.cloudfront.net  (54.239.132.69:80)

TCP (HTTP):
Connects to server-54-230-216-205.mrs50.r.cloudfront.net  (54.230.216.205:80)

TCP (HTTP):
Connects to server-54-230-0-59.lhr5.r.cloudfront.net  (54.230.0.59:80)

TCP (HTTP):
Connects to server-54-230-0-217.lhr5.r.cloudfront.net  (54.230.0.217:80)

TCP (HTTP):
Connects to server-54-192-185-46.cdg51.r.cloudfront.net  (54.192.185.46:80)

TCP (HTTP):
Connects to server-52-85-83-253.lax1.r.cloudfront.net  (52.85.83.253:80)

TCP (HTTP):
Connects to server-52-85-63-163.lhr50.r.cloudfront.net  (52.85.63.163:80)

TCP (HTTP):
Connects to server-52-84-246-223.sfo20.r.cloudfront.net  (52.84.246.223:80)

TCP (HTTP SSL):
Connects to ip-172-20-16-9.ec2.internal  (172.20.16.9:443)

TCP (HTTP):
Connects to cache.google.com  (93.123.23.18:80)

Remove geniecleaner.exe - Powered by Reason Core Security