holdpage.browseradapter.exe

Forever Net

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application holdpage.browseradapter.exe by Forever Net has been detected as adware by 28 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Forever Net  (signed and verified)

MD5:
4cbf77821531048bbda515e8c57855db

SHA-1:
0e64c790c5d870081dfb39a7ea0c8d0b2d0cbd8f

SHA-256:
ff3febde33a9a511514c9497f95f166c31b7ae16e1719cdff03d0c0c5164a949

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 3:31:39 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.8
674

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Generic
2015.04.01

AVG
AdPlugin
2016.0.3152

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1541

Bitdefender
Gen:Variant.Adware.SwiftBrowse.8
1.0.20.455

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-37332
0.98/21511

Comodo Security
TrojWare.Win32.BrowseFox.FX
21608

Dr.Web
Trojan.Yontoo.1734
9.0.1.091

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
8.15.04.01.02

ESET NOD32
Win32/BrowseFox.AC potentially unwanted (variant)
9.11408

F-Prot
W32/S-a777f78c
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.SwiftBrowse
11.2015-01-04_4

G Data
Gen:Variant.Adware.SwiftBrowse
15.4.25

K7 AntiVirus
Trojan
13.202.15449

McAfee
BrowseFox-FVR
5600.6808

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.8
16.0.0.273

NANO AntiVirus
Riskware.Win32.SwiftBrowse.dnpvbt
0.30.8.659

Panda Antivirus
Generic Suspicious
15.04.01.02

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo
15.4.1.14

Rising Antivirus
PE:Adware.SwiftBrowse!6.1A2E
23.00.65.15330

Sophos
Browse Fox
4.98

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
38956

Zillya! Antivirus
Trojan.Katusha.Win32.36918
2.0.0.2123

File size:
103.2 KB (105,712 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\hold page\bin\holdpage.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/5/2014 8:00:00 PM

Valid to:
10/6/2015 7:59:59 PM

Subject:
CN=Forever Net, O=Forever Net, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7B5ED55ED16E6F18734703E8E9B4C456

File PE Metadata
Compilation timestamp:
4/1/2015 4:32:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:UsTpawrfL7e9Fe7NgPZIeK+HkLn8B6kcaGS/w7:UsgiTi9FsN+PFLTGKw7

Entry address:
0x4535

Entry point:
E8, C5, 21, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, F3, 05, 00, 00, 3B, 0D, 70, 60, 41, 00, 75, 02, F3, C3, E9, 41, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 44, 23, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, 8A, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, F8, 74, 41, 00, 01, BF, EC, 74, 41, 00, BE, 24, 22, 41, 00, 75, 2C, 83, 0D, F8, 74, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 2C, 22, 41, 00, E8, 2C, 00, 00, 00, 68, 0E, 17, 41, 00, 89, 35, EC...
 
[+]

Entropy:
6.3882

Code size:
66 KB (67,584 bytes)

Remove holdpage.browseradapter.exe - Powered by Reason Core Security