jollywallet-codedownloader.exe

Radyoos Media Ltd.

The application jollywallet-codedownloader.exe by Radyoos Media has been detected as adware by 19 anti-malware scanners. This file is typically installed with the program JollyWallet by Radyoos Media Ltd. which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for jollywallet extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js.
Publisher:
jollywallet  (signed by Radyoos Media Ltd.)

Product:
jollywallet

Description:
jollywallet exe

Version:
1000.1000.1000.1000

MD5:
703de2afc3670580d0c59c738b9404ec

SHA-1:
5a4f2288012e87990f80457d726a9ac5bd616a87

SHA-256:
2b3758fb6ed7623c4e29db0515976bc892b9911543b7d98aeffeb8d2f19403c2

Scanner detections:
19 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Radyoos Media Ltd..

Analysis date:
4/25/2024 7:20:46 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.171.78

avast!
Win32:RadyoosMedia-A [PUP]
2014.9-151220

AVG
Generic_r
2016.0.2889

Baidu Antivirus
Trojan.Win32.Toolbar
4.0.3.151220

Comodo Security
ApplicUnwnt
19459

Dr.Web
Trojan.Crossrider.1
9.0.1.0354

ESET NOD32
Win32/Toolbar.CrossRider (variant)
9.9252

Fortinet FortiGate
Riskware/Toolbar_CrossRider
12/20/2015

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

G Data
Win32.Adware.Crossrider
15.12.24

K7 AntiVirus
Trojan
13.183.13305

Malwarebytes
PUP.Optional.PlusHD.A
v2015.12.20.09

McAfee
Artemis!764216EF251D
5600.6545

NANO AntiVirus
Trojan.Win32.Crossrider.daixor
0.28.2.61942

Reason Heuristics
Adware.Crossrider.RadyoosMedia (M)
15.12.20.21

Sophos
AppRider
4.98

Trend Micro House Call
TROJ_GEN.F47V0103
7.2.354

VIPRE Antivirus
Crossrider
25108

File size:
509.6 KB (521,864 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
jollywallet.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jollywallet\jollywallet-codedownloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/23/2012 5:00:00 PM

Valid to:
12/24/2013 4:59:59 PM

Subject:
CN=Radyoos Media Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Radyoos Media Ltd., L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
49AC6CD3FC56DEFFDF28CC3D8009CFD8

File PE Metadata
Compilation timestamp:
11/11/2013 7:15:17 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:S81meWiDI43fuH8eAyxcpJUK54khe8Ti+P3r5wpTBY3CiwhCyClT5:n1me1DNf2AySLUKlsb+apTG3Ciw0yQ5

Entry address:
0x45FFF

Entry point:
E8, C1, D6, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 90, B3, 47, 00, E8, FB, 49, 00, 00, E8, 6F, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, 54, D6, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 8B, 7A, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4359

Code size:
398 KB (407,552 bytes)

The file jollywallet-codedownloader.exe has been discovered within the following program.

JollyWallet  by Radyoos Media Ltd.
Publisher's description - “JollyWallet is an online shopping tool that combines cash back, discounts and online coupons.”
www.jollywallet.com
76% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/009589/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove jollywallet-codedownloader.exe - Powered by Reason Core Security