plumoweb.gcupdate.dll

PlumoWeb

This is the Google Chrome extension manager/updater for the Yontoo PlumoWeb branded web browser plugin which injects banners, text-link and popup ads in the Chorme browser. The module plumoweb.gcupdate.dll by PlumoWeb has been detected as adware by 16 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
PlumoWeb  (signed and verified)

Version:
1.0.5505.38754

MD5:
bc1fea1e43bd935a887194b606d32e1b

SHA-1:
a6d4303568a46db89dd30e67e70328630920235a

SHA-256:
649b723ef7d5bfab8744e92b802f565984650b2b7bc92027f7f3e5679d9cb100

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Part of the Yontoo distributed ad-supported web browser extension for Chrome.

Analysis date:
4/18/2024 12:30:05 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CQ
6473648

AhnLab V3 Security
Win-PUP/BrowseFox.Gen
2015.01.29

Avira AntiVirus
Adware/BrowseFox.apq
7.11.205.178

AVG
Generic
2016.0.3215

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.15128

Bitdefender
Adware.SwiftBrowse.CQ
1.0.20.140

Emsisoft Anti-Malware
Adware.SwiftBrowse.CQ
9.0.0.4799

ESET NOD32
MSIL/BrowseFox.L potentially unwanted application
7.0.302.0

F-Secure
Adware.SwiftBrowse.CQ
5.13.68

G Data
Adware.SwiftBrowse.CQ
15.1.25

McAfee
BrowseFox.g
5600.6871

MicroWorld eScan
Adware.SwiftBrowse.CQ
16.0.0.84

Norman
Adware.SwiftBrowse.CQ
03.12.2014 13:20:04

nProtect
Adware.SwiftBrowse.CQ
15.01.28.01

Panda Antivirus
Trj/CI.A
15.01.28.12

Reason Heuristics
Adware.Yontoo.PlumoWeb
15.1.28.12

File size:
1.7 MB (1,735,920 bytes)

Product version:
1.0.5505.38754

Original file name:
PlumoWeb.GCUpdate2015012805.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\plumoweb\bin\plugins\plumoweb.gcupdate.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/5/2014 1:00:00 AM

Valid to:
8/6/2015 12:59:59 AM

Subject:
CN=PlumoWeb, O=PlumoWeb, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
792D14E276E932D00A4F272C4ED5B70E

File PE Metadata
Compilation timestamp:
1/28/2015 5:31:54 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:DCnEUBRjL1VpaTS/62Ps99fKcFbJWAyXp1uUC/n:DO1zct2kvSebKX/CP

Entry address:
0x1A7AAA

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.3715

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.6 MB (1,727,488 bytes)

Remove plumoweb.gcupdate.dll - Powered by Reason Core Security