{cc30460f-753f-44d9-b58c-13dae1321968}w64.sys

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {cc30460f-753f-44d9-b58c-13dae1321968}w64.sys by Jump Flip has been detected as adware by 31 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{cc30460f-753f-44d9-b58c-13dae1321968}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Jump Flip)

Product:
StdLib

Version:
1.4.4.6 built by: WinDDK

MD5:
d2931ca36e1ff62b33688fd5a4b56ec4

SHA-1:
b83040beb9591aad332fd2cb8ef6f2ffdfbe585e

SHA-256:
b9f1d26b8a229428165eaebe1837a69224e649cae7a73b3b2b479e1e1952ce50

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/20/2024 3:33:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CH
567

Agnitum Outpost
Riskware.NetFilter
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.23

avast!
Win32:BrowseFox-DZ [PUP]
2014.9-150717

AVG
Adware AdPlugin
2016.0.3045

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15717

Bitdefender
Adware.SwiftBrowse.BV
1.0.20.990

Bkav FE
W64.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Swiftbrowse-284
0.98/21411

Comodo Security
UnclassifiedMalware
18740

Dr.Web
Trojan.Yontoo.1734
9.0.1.0198

Emsisoft Anti-Malware
Adware.SwiftBrowse.CH
8.15.07.17.07

ESET NOD32
Win64/BrowseFox.CG potentially unwanted application
9.7.0.302.0

F-Prot
W64/A-abca7297
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CH
11.2015-17-07_6

G Data
Adware.SwiftBrowse.BV
15.7.24

IKARUS anti.virus
AdWare.SpadeCast
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.196.15011

Malwarebytes
PUP.Optional.NetFilter
v2015.07.17.07

McAfee
Artemis!F317955BEF2D
5600.6701

MicroWorld eScan
Adware.SwiftBrowse.BV
16.0.0.594

Norman
Adware.SwiftBrowse.CH
11.20150717

nProtect
Adware.SwiftBrowse.BV
14.09.22.01

Qihoo 360 Security
Win32/Trojan.RiskWare.a25
1.0.0.1015

Reason Heuristics
PUP.Yontoo.JumpFlip (M)
15.7.17.19

Sophos
BrowseSmart
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9747

Trend Micro House Call
Suspicious_GEN.F47V0617
7.2.198

Trend Micro
HS_BROWSEFOX.SM
10.465.17

VIPRE Antivirus
Trojan.Win32.Generic
33352

Zillya! Antivirus
Adware.Yotoon.Win64.3
2.0.0.1901

File size:
47.7 KB (48,832 bytes)

Product version:
1.4.4.6

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{cc30460f-753f-44d9-b58c-13dae1321968}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/21/2013 8:00:00 PM

Valid to:
8/22/2015 7:59:59 PM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
11/17/2014 8:25:18 AM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:lH7G2EjsnyXeOUEGG0LA8tWFZuL470h6aqxcCT2kvsVRwlZD3X3Q:RFID6EGnLA8AFJTNEVmDHQ

Entry address:
0xC064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, E2, 50, FF, FF, CC, CC, 78, C2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 54, C6, 00, 00, A0, 91, 00, 00, 28, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DA, CA, 00, 00, 50, 90, 00, 00, D8, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D2, CB, 00, 00, 00, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, CB, 00, 00, 00, 00, 00, 00, A2, CB, 00, 00...
 
[+]

Entropy:
6.3929

Code size:
34.5 KB (35,328 bytes)

Driver
Display name:
{cc30460f-753f-44d9-b58c-13dae1321968}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI