updateholdpage.exe

Forever Net

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application updateholdpage.exe by Forever Net has been detected as adware by 15 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Hold Page”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Forever Net  (signed and verified)

Version:
1.0.5569.9658

MD5:
1dafd59b6566bf4347fdc0a28b79c2da

SHA-1:
a25061a4f9ac57f1f0d7d4d41c8e8eac63ee86a5

SHA-256:
c08a112bc267dd7066bb3785761124b7cbf2df1d02e183e245df06dbd457b623

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 6:13:49 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2016.0.3152

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.1541

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1734
9.0.1.091

ESET NOD32
MSIL/BrowseFox.G potentially unwanted (variant)
9.11411

Fortinet FortiGate
Adware/BrowseFox
4/1/2015

F-Prot
W32/S-e8c6878a
v6.4.7.1.166

K7 AntiVirus
Adware
13.202.15452

Malwarebytes
PUP.Optional.HoldPage.A
v2015.04.01.02

McAfee
BrowseFox-FWI
5600.6808

NANO AntiVirus
Riskware.Win32.BPlug.djpkri
0.30.8.659

Qihoo 360 Security
Win32/Virus.Adware.708
1.0.0.1015

Reason Heuristics
PUP.Service.Yontoo
15.4.1.14

Sophos
Browse Fox
4.98

VIPRE Antivirus
Yontoo
38966

File size:
402.7 KB (412,400 bytes)

Product version:
1.0.5569.9658

Original file name:
HoldPage2015040113.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\hold page\updateholdpage.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/5/2014 8:00:00 PM

Valid to:
10/6/2015 7:59:59 PM

Subject:
CN=Forever Net, O=Forever Net, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7B5ED55ED16E6F18734703E8E9B4C456

File PE Metadata
Compilation timestamp:
4/1/2015 9:22:15 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:/NOKi0rMiowSN8oNaIIH8Q4SdwhZUsYiisZjnKXqOK5xD+qIoKZUlPfMU2dNd1wx:/NOKkimAOYA0XqOK5xDEoKGXqXwbjhT

Entry address:
0x6470A

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.4901

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
394 KB (403,456 bytes)

Service
Display name:
Update Hold Page

Type:
Win32OwnProcess


Remove updateholdpage.exe - Powered by Reason Core Security