jumpflip.expext.exe

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application jumpflip.expext.exe by Jump Flip has been detected as adware by 21 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. While running, it connects to the Internet address install.jumpflip.net on port 80 using the HTTP protocol.
Publisher:
Jump Flip  (signed and verified)

Version:
1.0.6242.39491

MD5:
6ac3051c9d7213642bc33138a2f44d1c

SHA-1:
91542e24d79c47ced2764c6f65ccf64c855198fe

SHA-256:
15f74f7028a6fb4baf46bdbf78b8cc8fbde99056d67eedb7366ccda7f948631f

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/26/2024 1:09:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.BJ
5775175

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.Gen2
8.3.1.6

Arcabit
Adware.BrowseFox.BJ
1.0.0.425

avast!
Win32:BrowseFox-DZ [PUP]
150602-1

AVG
BrowseFox
2016.0.3079

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15613

Bitdefender
Adware.BrowseFox.BJ
1.0.20.820

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1734
9.0.1.05190

Emsisoft Anti-Malware
Adware.BrowseFox.BJ
10.0.0.5366

ESET NOD32
Win32/InstallCore.ZT potentially unwanted application
7.0.302.0

F-Secure
Adware.BrowseFox.BJ
5.14.151

G Data
Adware.BrowseFox.BJ
15.6.25

Malwarebytes
PUP.Optional.JumpFlip.A
v2015.06.13.10

MicroWorld eScan
Adware.BrowseFox.BJ
16.0.0.492

Norman
Adware.BrowseFox.BJ
02.06.2015 14:23:46

nProtect
Adware.BrowseFox.BJ
15.06.12.01

Quick Heal
PUA.Jumpflip.Gen
6.15.14.00

Reason Heuristics
Adware.Yontoo.JumpFlip
15.6.13.18

VIPRE Antivirus
Threat.4741131
40786

File size:
111.8 KB (114,464 bytes)

Product version:
1.0.6242.39491

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jump flip\bin\jumpflip.expext.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/22/2013 2:00:00 AM

Valid to:
8/23/2015 1:59:59 AM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
6/13/2015 5:31:56 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:7xJywe6LQnYBhdxfxOVIJOJdGVncKpVckkpY9Vflnha5HQ5ilPOqIY1Wvm0:HBBDrOro/Vq40i1qIkW+0

Entry address:
0x71E7

Entry point:
E8, BE, 47, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 74, 43, 41, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, A4, 40, 41, 00, C9, C2, 08, 00, B8, EF, C4, 40, 00, A3, D0, 9A, 41, 00, C7, 05, D4, 9A, 41, 00, E5, BB, 40, 00, C7, 05, D8, 9A, 41, 00, 99, BB, 40, 00, C7, 05, DC, 9A, 41, 00, D2, BB, 40, 00, C7, 05...
 
[+]

Code size:
73.5 KB (75,264 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to install.jumpflip.net  (70.186.131.184:80)

Remove jumpflip.expext.exe - Powered by Reason Core Security