updateholdpage.exe

Hold Page

Part of the Yontoo web browser plugin (delivers advertisements to the web browser in the form of injected banners, text-links, popups, etc.) the updater mechanism for Hold Page will automatically keep the extension patched by downloaded new functionality which is auto-enabled by default. The application updateholdpage.exe by Hold Page has been detected as adware by 9 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Hold Page”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Hold Page  (signed and verified)

Version:
1.0.5444.33103

MD5:
3616b14b32373e29442b65dc287d116b

SHA-1:
cd339f2ebac59a1bfbe4a41e5a9c4c431d895728

SHA-256:
ec4eda7848aaf648f957275bc78fe0e7a069f95775396147e86924e7d70bdf6b

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Part of the Yontoo adware web browser extension update process.

Analysis date:
4/26/2024 4:30:21 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/BrowseFox.Gen7
7.11.189.70

avast!
Win32:BrowseFox-DQ [PUP]
2014.9-141128

AVG
Generic
2015.0.3277

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.141128

ESET NOD32
MSIL/BrowseFox (variant)
8.10794

K7 AntiVirus
Unwanted-Program
13.186.14161

Malwarebytes
PUP.Optional.HoldPage.A
v2014.11.28.03

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Reason Heuristics
Adware.Yontoo.Service.O
14.12.1.0

File size:
513.7 KB (526,064 bytes)

Product version:
1.0.5444.33103

Original file name:
HoldPage2014112802.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\hold page\updateholdpage.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/2/2014 8:00:00 AM

Valid to:
9/3/2015 7:59:59 AM

Subject:
CN=Hold Page, O=Hold Page, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5097461A9471FDD2B020491B464CDCD9

File PE Metadata
Compilation timestamp:
11/28/2014 10:23:33 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:zTlN5lSGTK6EAJSwkndhBEx+tCgQg3lSIGXcQt5xkDlPsyMnD:z7l2994UOx5CJJMD

Entry address:
0x801EA

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.9170

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
505 KB (517,120 bytes)

Service
Display name:
Update Hold Page

Type:
Win32OwnProcess


Remove updateholdpage.exe - Powered by Reason Core Security