jollywallet-codedownloader.exe

Radyoos Media Ltd.

The application jollywallet-codedownloader.exe by Radyoos Media has been detected as adware by 19 anti-malware scanners. This file is typically installed with the program JollyWallet by Radyoos Media Ltd. which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for JollyWallet extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js.
Publisher:
JollyWallet  (signed by Radyoos Media Ltd.)

Product:
JollyWallet

Description:
JollyWallet exe

Version:
1000.1000.1000.1000

MD5:
fc51c7e3cf4169c337a0d8ef95837a74

SHA-1:
bbc23322ef4d626f4d0df36f7bc9218b32e9b25d

SHA-256:
c19859cb3288ffe075521279ca8cb4f409bedfb888337cc8e865a6f75578249e

Scanner detections:
19 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Radyoos Media Ltd..

Analysis date:
4/26/2024 11:10:39 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.171.78

avast!
Win32:RadyoosMedia-A [PUP]
2014.9-160211

AVG
Generic_r
2017.0.2837

Baidu Antivirus
Trojan.Win32.Toolbar
4.0.3.16211

Comodo Security
ApplicUnwnt
19459

Dr.Web
Trojan.Crossrider.1
9.0.1.042

ESET NOD32
Win32/Toolbar.CrossRider (variant)
10.9252

Fortinet FortiGate
Riskware/Toolbar_CrossRider
2/11/2016

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

G Data
Win32.Adware.Crossrider
16.2.24

K7 AntiVirus
Trojan
13.183.13305

Malwarebytes
PUP.Optional.PlusHD.A
v2016.02.11.08

McAfee
Artemis!764216EF251D
5600.6493

NANO AntiVirus
Trojan.Win32.Crossrider.daixor
0.28.2.61942

Reason Heuristics
Adware.Crossrider.RadyoosMedia (M)
16.2.11.7

Sophos
AppRider
4.98

Trend Micro House Call
TROJ_GEN.F47V0103
7.2.42

VIPRE Antivirus
Crossrider
25108

File size:
465.1 KB (476,296 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
JollyWallet.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jollywallet\jollywallet-codedownloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/23/2012 6:00:00 PM

Valid to:
12/24/2013 5:59:59 PM

Subject:
CN=Radyoos Media Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Radyoos Media Ltd., L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
49AC6CD3FC56DEFFDF28CC3D8009CFD8

File PE Metadata
Compilation timestamp:
5/27/2013 5:00:01 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:8zu7VhKUyVyiBXhgPl+SddmdmYWTtEgiDSaHYT/InZfUsg9eyBrYRjPzSQV1pTpr:IBxes2eXBSQV/TCmZJ

Entry address:
0x42EA9

Entry point:
E8, FA, B4, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB...
 
[+]

Entropy:
6.5157

Code size:
371.5 KB (380,416 bytes)

The file jollywallet-codedownloader.exe has been discovered within the following program.

JollyWallet  by Radyoos Media Ltd.
Publisher's description - “JollyWallet is an online shopping tool that combines cash back, discounts and online coupons.”
www.jollywallet.com
76% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/005620/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove jollywallet-codedownloader.exe - Powered by Reason Core Security