holdpage.expext.exe

middle pages

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application holdpage.expext.exe by middle pages has been detected as adware by 18 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
middle pages  (signed and verified)

Version:
1.0.6242.39491

MD5:
5a13ed3cbd59203b67f4ac1cae68cfb7

SHA-1:
1ac50e33de162c01cae34a936b0c8bfeb0fd4ca6

SHA-256:
78d081ff1c39475c423a63de9ea4ba5e178cac5878f1877ba6b4dfc22d674aaf

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/8/2024 12:03:09 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.AL
6213306

AhnLab V3 Security
PUP/Win32.BrowseFox
2014.12.22

Avira AntiVirus
Adware/BrowseFox.A.58
7.11.197.26

AVG
Generic
2015.0.3253

Bitdefender
Adware.BrowseFox.AL
1.0.20.1780

Clam AntiVirus
Win.Adware.Browsefox-140
0.98/21511

Emsisoft Anti-Malware
Adware.BrowseFox.AL
9.0.0.4668

ESET NOD32
Win32/BrowseFox.AA potentially unwanted application
7.0.302.0

F-Prot
W32/S-4b3c2716
v6.4.7.1.166

F-Secure
Adware.BrowseFox.AL
5.13.68

G Data
Adware.BrowseFox.AL
14.12.24

K7 AntiVirus
Unwanted-Program
13.188.14395

MicroWorld eScan
Adware.BrowseFox.AL
15.0.0.1068

Norman
Adware.BrowseFox.AL
04.12.2014 14:30:06

nProtect
Adware.BrowseFox.AL
14.12.19.01

Reason Heuristics
Adware.Yontoo.middlepages
15.1.12.11

SUPERAntiSpyware
Adware.BrowserFox/Variant
10163

VIPRE Antivirus
Threat.4150696
35418

File size:
99.2 KB (101,616 bytes)

Product version:
1.0.6242.39491

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hold page\bin\holdpage.expext.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/6/2014 8:00:00 PM

Valid to:
10/2/2015 7:59:59 PM

Subject:
CN=middle pages, O=middle pages, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01FD540333A96486522A2EDFD3C2E0B3

File PE Metadata
Compilation timestamp:
12/21/2014 10:38:24 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:w161oH5YT40K+R/gEWGnadKCxXfPWK6tHEkynMBfuDOSVgkRjA:bE5Y/Ku7YxXf+K6t8OSVg6jA

Entry address:
0x561E

Entry point:
E8, AB, 3C, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 64, 7F, 41, 00, FF, 15, 4C, 20, 41, 00, 85, C0, 75, 18, 56, E8, 2F, 08, 00, 00, 8B, F0, FF, 15, 68, 20, 41, 00, 50, E8, DF, 07, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, C0, 91, 41, 00, 00, 74, 05, E9, CD, 3C, 00, 00, 57, 8B...
 
[+]

Entropy:
6.4321

Code size:
65.5 KB (67,072 bytes)

Remove holdpage.expext.exe - Powered by Reason Core Security