HoldPage.BOAS.exe

Hold Page

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application HoldPage.BOAS.exe, “HoldPage.BOAS.exe” by Hold Page has been detected as adware by 16 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Hold Page  (signed and verified)

Description:
HoldPage.BOAS.exe

Version:
1.0.0.1

MD5:
642a1267a4be5b06c2714eef7e953307

SHA-1:
debd9bf776250762141b818c613b64bf446ff27e

SHA-256:
2cf8b7098923bbfb4503737d922806dba762a177b5c408d472ac677a8de84d3e

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/6/2024 4:48:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.158883
799

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2014.11.28

Avira AntiVirus
APPL/BrowseFox.Gen4
7.11.189.40

AVG
Generic
2015.0.3277

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141127

Bitdefender
Gen:Variant.Adware.Graftor.158883
1.0.20.1655

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.158883
8.14.11.27.12

ESET NOD32
Win32/BrowseFox (variant)
8.10791

F-Secure
Gen:Variant.Adware.Graftor.158883
11.2014-27-11_5

G Data
Gen:Variant.Adware.Graftor.158883
14.11.24

MicroWorld eScan
Gen:Variant.Adware.Graftor.158883
15.0.0.993

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.HoldPage.M
14.12.1.0

Vba32 AntiVirus
AdWare.SwiftBrowse
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
35186

File size:
1.7 MB (1,791,216 bytes)

Product version:
1.0.0.1

Original file name:
HoldPage.BOAS.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hold page\bin\holdpage.boas.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/1/2014 7:00:00 PM

Valid to:
9/2/2015 6:59:59 PM

Subject:
CN=Hold Page, O=Hold Page, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5097461A9471FDD2B020491B464CDCD9

File PE Metadata
Compilation timestamp:
11/27/2014 6:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:MMKHNDKEQkGmSK5sdktUSTlb/oLEchSatitfHB98gu3bEBz7Pm2ICLk0Ktd+qB+:tu+Ecm1s6DTl/oLEchSatitvibabm2IA

Entry address:
0x107789

Entry point:
E8, CA, 72, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, B8, 3E, 58, 00, 75, 02, F3, C3, E9, 51, 73, 00, 00, 8B, 41, 04, 85, C0, 75, 05, B8, F0, C6, 55, 00, C3, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 57, 8B, F9, 74, 2D, 56, FF, 75, 08, E8, 7A, 38, 00, 00, 8D, 70, 01, 56, E8, 1C, 06, 00, 00, 59, 59, 89, 47, 04, 85, C0, 74, 11, FF, 75, 08, 56, 50, E8, 17, 74, 00, 00, 83, C4, 0C, C6, 47, 08, 01, 5E, 5F, 5D, C2, 04, 00, 8B, FF, 56, 8B, F1, 80, 7E, 08, 00, 74, 09, FF, 76, 04, E8, FB, 09, 00, 00, 59, 83, 66, 04, 00, C6, 46...
 
[+]

Entropy:
6.4176

Code size:
1.2 MB (1,263,104 bytes)

Remove HoldPage.BOAS.exe - Powered by Reason Core Security