dnsminong.exe

The application dnsminong.exe has been detected as a potentially unwanted program by 24 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler named DNSMINONG triggered to execute each time a user logs in. According to AVG, this software downloads additional adware offers during setup.
Version:
1.0.0.0

MD5:
630a2bc741ee1a72119495119d106ea8

SHA-1:
139b3b1711819f898a9c7f3a331dc37c3185de85

SHA-256:
13c4fb6a625caa9dc89a79041e235d63eecf12bb67668503e8743faba18c4978

Scanner detections:
24 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 3:40:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.727881
435

Agnitum Outpost
PUA.CloudGuard
7.1.1

AhnLab V3 Security
PUP/Win32.Helper
2015.10.10

Avira AntiVirus
ADWARE/CloudGuard.536576.7
8.3.2.2

Arcabit
Trojan.Kazy.DB1B49
1.0.0.582

avast!
Win32:Adware-gen [Adw]
2014.9-151126

AVG
Downloader
2016.0.2913

Bitdefender
Gen:Variant.Kazy.727881
1.0.20.1650

Comodo Security
ApplicUnwnt
23384

Dr.Web
Adware.DnsChange.1
9.0.1.0330

Emsisoft Anti-Malware
Gen:Variant.Kazy.727881
8.15.11.26.08

ESET NOD32
MSIL/Adware.CloudGuard (variant)
9.12383

Fortinet FortiGate
Riskware/CloudGuard
11/26/2015

F-Secure
Gen:Variant.Kazy.727881
11.2015-26-11_5

G Data
Gen:Variant.Kazy.727881
15.11.25

Kaspersky
not-a-virus:WebToolbar.MSIL.Agent
14.0.0.1061

MicroWorld eScan
Gen:Variant.Kazy.727881
16.0.0.990

NANO AntiVirus
Riskware.Win32.CloudGuard.dwyskm
0.30.26.3947

Panda Antivirus
Trj/CI.A
15.11.26.08

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Sophos
CloudGuard (PUA)
4.98

Trend Micro
TROJ_GEN.R0C1C0OIO15
10.465.26

VIPRE Antivirus
Trojan.Win32.Generic
44408

Zillya! Antivirus
Adware.Agent.Win32.77808
2.0.0.2435

File size:
524 KB (536,576 bytes)

Product version:
1.0.0.0

Copyright:
Copyright ©2015 .

Original file name:
TTT.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\dns unlocker\dnsminong.exe

File PE Metadata
Compilation timestamp:
9/9/2015 9:38:22 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:CXtwqfPg15Hl1ZFaxG849Lv6qf3aD0PjVir/gLqJiJqc09Fh:CXtwEPs5FR9T6qC+Mr/qUiQr

Entry address:
0x83A2E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.7795

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
519 KB (531,456 bytes)

Scheduled Task
Task name:
DNSMINONG

Trigger:
Logon (Runs on logon)

Description:
DNSMINONG


Remove dnsminong.exe - Powered by Reason Core Security