GridinSoft Threat Intelligence

RegistryCleaner.exe file report

Under review File reputation report
MD5 c1143ff8880ca70b8ba49715139c284f
Latest seen 2024-06-24 23:04:26 (2 years ago)
First seen 2018-06-15 13:13:08 (7 years ago)
Size 1 MB
Publisher Aus˜logics
Product BoostSp˜eed

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2018-06-15 13:13:08 (7 years ago); latest analysis 2024-06-24 23:04:26 (2 years ago).

Publisher context

Company metadata: Aus˜logics. Product metadata: BoostSp˜eed.

Digital signature

Signed by Auslogics Labs Pty Ltd. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

RegistryCleaner.exe is a Windows file recorded in the ThreatInfo database. It is associated with BoostSp˜eed. The reported company name is Aus˜logics. The current detection status is Undefined, based on the latest analysis from 2024-06-24 23:04:26 (2 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: BoostSp˜eed
Company Name: Aus˜logics
MD5: c1143ff8880ca70b8ba49715139c284f
Size: 1 MB
First Published: 2018-06-15 13:13:08 (7 years ago)
Latest Published: 2024-06-24 23:04:26 (2 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2024-06-24 23:04:26 (2 years ago)
Signed By: Auslogics Labs Pty Ltd
Status: Valid

The signature on RegistryCleaner.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\auslogics
%desktop%\телеф\новая папка\auslogics boostspeed\app
%programfiles%\auslogics\app
%programfiles%
%desktop%\programme\auslogics.boostspeed.10.0.12.portable.karanpc\app
%desktop%\auslogics boostspeed\app
%sysdrive%\progra~1\auslogics
%programfiles%\auslogicsboostspeed\auslogics boostspeedportable\app
%desktop%\auslogics.boostspeed.10.0.12.portable\app
%sysdrive%\программы\программы для чистки\auslogics boostspeed premium v10.0.12 portable\auslogics boostspeed portable\app

ThreatInfo has observed RegistryCleaner.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

Windows 10 62.8%
Windows 7 22.6%
Windows 8.1 13.7%
Windows XP 0.6%
Windows Embedded Standard 0.3%

The most common operating system signal for RegistryCleaner.exe is Windows 10 with 62.8% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

RegistryCleaner.exe is identified as pe for 32-bit systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Format pe
Architecture 32-bit
Subsystem Windows GUI
Entry point 0x000d6acc
Image base 0x00400000

PE Sections:

Sections 11
Raw data 1205760

Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.

.text 871424 bytes · 72.3% of section data
MD5 db46c1fabd0e047ed2a9c84e7bd9623a
.itext 3584 bytes · 0.3% of section data
Uncommon name
MD5 2e78c7f189bf7f1472612d5df29317de
.data 17920 bytes · 1.5% of section data
MD5 6051b200a8f4a01ed185159fd521cae5
.bss 0 bytes · 0.0% of section data
MD5 00000000000000000000000000000000
.idata 89600 bytes · 7.4% of section data
MD5 392c3da2529d7adb9e80e8cdccf007d1
.didata 512 bytes · 0.0% of section data
Uncommon name
MD5 ecc7f8a5832c63d13e13dd5f7b17a624
.edata 512 bytes · 0.0% of section data
MD5 c9723ebab53e27df69b1824f952431df
.tls 0 bytes · 0.0% of section data
MD5 00000000000000000000000000000000
.rdata 512 bytes · 0.0% of section data
MD5 94438aff801a2b0faa69df7b6519ae86
.rsrc 157696 bytes · 13.1% of section data
MD5 62761da786e429568edbf19e6d233d87
.xdata 64000 bytes · 5.3% of section data
Uncommon name
MD5 15b8c89012bc907312b1bae5ee15c680

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

Report conclusion

This file is still under review

ThreatInfo has not assigned a final verdict yet. Compare the file hash, location, signature, and publisher before trusting the file on a production system.

Scan with GridinSoft Anti-Malware Use a local scan if the file origin or behavior is unclear. Check this hash on VirusTotal

Recommended next steps

  • Compare the local file MD5 with c1143ff8880ca70b8ba49715139c284f.
  • Check the file path, publisher, and signature against the details in this report.
  • Run a GridinSoft scan if the source, path, or behavior looks unusual.