dlnow.exe

DLNow Video Downloader

Logixoft

The application dlnow.exe by Logixoft has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address cluster002.ovh.net on port 80 using the HTTP protocol.
Publisher:
Logixoft  (signed and verified)

Product:
DLNow Video Downloader

Version:
1.2.0.0

MD5:
4418c3a9c561c756441323fdcaceabb8

SHA-1:
4096785f2943b07f80abf84886e0e56945337118

SHA-256:
0d2bf09cdcb3651814267aed4cb596394c001a7a8cc4c54d42c88b6d5d35ecc0

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/16/2024 8:45:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Logixoft (M)
15.8.12.13

File size:
209.6 KB (214,600 bytes)

Product version:
1.2.0.0

Copyright:
Copyright (C) 2015 Logixoft

Original file name:
dlnow.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\dlnow\dlnow.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/11/2013 2:00:00 AM

Valid to:
4/11/2016 1:59:59 AM

Subject:
CN=Logixoft, O=Logixoft, STREET="14, rue Marie-Rose le Bloch", L=QUIMPER, S=Bretagne, PostalCode=29000, C=FR

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5B18B568174DC2D647EC70ED13CCBB8D

File PE Metadata
Compilation timestamp:
7/27/2015 5:53:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
3072:fbQ/PTL6SULvwGXNoGVyECKVYtvrmHMWdmHBoRuZEaiiga5l7vDdTRkMwIG6UPWz:jWp8XNkRrmsamhGuZviv4jTRTUP

Entry address:
0x1171C

Entry point:
E8, 10, 04, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 98, 60, 41, 00, E8, CE, 01, 00, 00, 33, F6, 89, 75, E4, 89, 75, E0, FF, 15, 04, 32, 41, 00, 0F, B7, D8, 89, 75, FC, 64, A1, 18, 00, 00, 00, 8B, 50, 04, 8B, FE, BE, C4, 96, 41, 00, 8B, CA, 33, C0, F0, 0F, B1, 0E, 85, C0, 74, 0B, 3B, C2, 75, F0, 33, F6, 46, 8B, FE, EB, 03, 33, F6, 46, 39, 35, C8, 96, 41, 00, 75, 0A, 6A, 1F, E8, 65, 02, 00, 00, 59, EB, 3B, 83, 3D, C8, 96, 41, 00, 00, 75, 2C, 89, 35, C8, 96, 41, 00, 68, 7C, 35, 41, 00, 68, 68, 35, 41, 00, E8...
 
[+]

Code size:
69.5 KB (71,168 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to cluster002.ovh.net  (87.98.255.2:80)

TCP (HTTP):
Connects to akamai-cdn-193-120-1-24.cwt.btireland.net  (193.120.1.24:80)

TCP (HTTP):
Connects to host81-150-22-9.in-addr.btopenworld.com  (81.150.22.9:80)

TCP (HTTP):

Remove dlnow.exe - Powered by Reason Core Security