pdnsomys.exe

Video Dimmer

Small Island Development

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application pdnsomys.exe, “VideoDimmer Service” by Small Island Development has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “pDnsomYs”.
Publisher:
Small Island Development  (signed and verified)

Product:
Video Dimmer

Description:
VideoDimmer Service

Version:
1.0.0.0

MD5:
059f24bb6f23520dcbae2b72dcf29e0a

SHA-1:
72970fe9ccbe569f60089d8ea2e2ce553b0839ad

SHA-256:
157677dee8e565a3715938042af68ef3d1ec74b874d729d667e2a3e4e645c1c0

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/15/2024 12:08:10 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.3.13.3

File size:
2.6 MB (2,733,552 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Small Island Development 2015

Original file name:
VideoDimmerService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\lqtwkhddh\pdnsomys.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
12/23/2014 6:00:00 PM

Valid to:
2/22/2016 5:59:59 PM

Subject:
CN=Small Island Development, O=Small Island Development, L=St. James, S=St. James, C=BB

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
2ACB4CDCE993E485342ABFA2BCA95A17

File PE Metadata
Compilation timestamp:
2/10/2015 1:41:10 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x29B03E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9995

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,724,352 bytes)

Service
Display name:
pDnsomYs

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


Remove pdnsomys.exe - Powered by Reason Core Security