3ed0e0bb8a674dbe8f98.dll

PlumoWeb

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module 3ed0e0bb8a674dbe8f98.dll by PlumoWeb has been detected as adware by 24 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
PlumoWeb  (signed and verified)

MD5:
18b9e1f8023cc8c13d1c5b51d93fbb70

SHA-1:
e932d446db567fb440fe3e9dea0b401e2bc2751d

SHA-256:
d2b1b9d0e119f81c3798ef5fa7edf6536fb72c39be5444db86cfe021f2748d0f

Scanner detections:
24 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/19/2024 8:17:33 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.MPlug.Q
833

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.181.44

AVG
Generic
2015.0.3311

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141025

Bitdefender
Adware.MPlug.Q
1.0.20.1490

Dr.Web
Trojan.BPlug.307
9.0.1.0298

Emsisoft Anti-Malware
Adware.MPlug.Q
8.14.10.25.11

ESET NOD32
Win32/BrowseFox.N potentially unwanted application
8.7.0.302.0

F-Prot
W32/A-d34eca05
v6.4.7.1.166

F-Secure
Adware.MPlug.Q
11.2014-25-10_7

G Data
Adware.MPlug
14.10.24

IKARUS anti.virus
PUA.BrowseFox
t3scan.1.7.5.0

McAfee
Artemis!BBA0B0012B3D
5600.6967

MicroWorld eScan
Adware.MPlug.Q
15.0.0.894

NANO AntiVirus
Riskware.Win32.Kranet.dgstaw
0.28.2.62841

nProtect
Adware.MPlug.Q
14.08.19.01

Reason Heuristics
Threat.Win.Reputation.IMP
14.10.25.11

Sophos
Browse Fox
4.98

Trend Micro House Call
ADW_BROWSEF
7.2.298

Trend Micro
ADW_BROWSEF
10.465.25

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Yontoo
32378

Zillya! Antivirus
Adware.Kranet.Win32.76
2.0.0.1899

File size:
190.7 KB (195,312 bytes)

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\plumoweb\bin\3ed0e0bb8a674dbe8f98.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/5/2014 1:00:00 AM

Valid to:
8/6/2015 12:59:59 AM

Subject:
CN=PlumoWeb, O=PlumoWeb, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
792D14E276E932D00A4F272C4ED5B70E

File PE Metadata
Compilation timestamp:
10/22/2014 1:24:46 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:KcF2RGITusYmEdE2cvA60xXbAULmLKk1aoioGE3rc/zT/P8vRRZSX:KcIIt6vA60xXMvKk1/ioGkryn/kNSX

Entry address:
0x11C8D

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, 81, 7C, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, D0, 45, 02, 10, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 34, 40, 02, 10, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64...
 
[+]

Code size:
140 KB (143,360 bytes)

Remove 3ed0e0bb8a674dbe8f98.dll - Powered by Reason Core Security