dlnow.exe

DLNow Video Downloader

Logixoft

The application dlnow.exe by Logixoft has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address cluster002.ovh.net on port 80 using the HTTP protocol.
Publisher:
Logixoft  (signed and verified)

Product:
DLNow Video Downloader

Version:
1.1.0.0

MD5:
0e46b96344ba84d1a4785b8429cad1d3

SHA-1:
51acc11d53096347524d0953974f4dbeb07c54a6

SHA-256:
805ad345bf7fc55d53276b1f53b2e649c51cd6b1d78226038c7760c6ac59d4aa

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/27/2024 6:28:37 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Logixoft (M)
15.8.5.5

File size:
210.1 KB (215,112 bytes)

Product version:
1.1.0.0

Copyright:
Copyright (C) 2015 Logixoft

Original file name:
dlnow.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\dlnow\dlnow.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/10/2013 7:30:00 PM

Valid to:
4/10/2016 7:29:59 PM

Subject:
CN=Logixoft, O=Logixoft, STREET="14, rue Marie-Rose le Bloch", L=QUIMPER, S=Bretagne, PostalCode=29000, C=FR

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5B18B568174DC2D647EC70ED13CCBB8D

File PE Metadata
Compilation timestamp:
7/3/2015 2:56:16 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
3072:PD9/dRL64jZWabONoGN5REyaG7MW8MMpoRuZEaiiga5l7vDdTRkMwIG6UPWhRLNI:LxnbONZPPWpGuZviv4jTRTUP

Entry address:
0x1183C

Entry point:
E8, 10, 04, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, A8, 60, 41, 00, E8, CE, 01, 00, 00, 33, F6, 89, 75, E4, 89, 75, E0, FF, 15, 04, 32, 41, 00, 0F, B7, D8, 89, 75, FC, 64, A1, 18, 00, 00, 00, 8B, 50, 04, 8B, FE, BE, C4, 96, 41, 00, 8B, CA, 33, C0, F0, 0F, B1, 0E, 85, C0, 74, 0B, 3B, C2, 75, F0, 33, F6, 46, 8B, FE, EB, 03, 33, F6, 46, 39, 35, C8, 96, 41, 00, 75, 0A, 6A, 1F, E8, 65, 02, 00, 00, 59, EB, 3B, 83, 3D, C8, 96, 41, 00, 00, 75, 2C, 89, 35, C8, 96, 41, 00, 68, 7C, 35, 41, 00, 68, 68, 35, 41, 00, E8...
 
[+]

Code size:
70 KB (71,680 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cluster002.ovh.net  (87.98.255.2:80)

Remove dlnow.exe - Powered by Reason Core Security