jollywallet-codedownloader.exe

Radyoos Media Ltd.

The application jollywallet-codedownloader.exe by Radyoos Media has been detected as adware by 9 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program JollyWallet by Radyoos Media Ltd. which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for jollywallet extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js.
Publisher:
jollywallet  (signed by Radyoos Media Ltd.)

Product:
jollywallet

Description:
jollywallet exe

Version:
1000.1000.1000.1000

MD5:
d9365b4815bf9e07c500d10a2aacadbf

SHA-1:
c3acf1376f2bb9e8e9e45737e479706f0b4a7ab1

SHA-256:
763c8d385433084ec4899bcf4e5359a1c95eecc7597ac6faada375e28b48fde6

Scanner detections:
9 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Radyoos Media Ltd..

Analysis date:
4/26/2024 8:10:28 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.182.126

avast!
Win32:RadyoosMedia-A [PUP]
141025-0

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.141030

ESET NOD32
Win32/Toolbar.CrossRider.AM potentially unwanted application
7.0.302.0

G Data
Win32.Adware.Crossrider
14.10.24

Malwarebytes
PUP.Optional.JollyWallet.A
v2014.10.30.10

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.AA
14.10.28.6

VIPRE Antivirus
Threat.4789396
34232

File size:
1.1 MB (1,128,808 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
jollywallet.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jollywallet\jollywallet-codedownloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/12/2013 3:00:00 AM

Valid to:
2/12/2016 2:59:59 AM

Subject:
CN=Radyoos Media Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Radyoos Media Ltd., L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06C470BB28DFF4919F7971031170309C

File PE Metadata
Compilation timestamp:
9/11/2014 2:04:47 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:4KhhQax3EeUy8pcoeMKeDf2xQ7pSSZmTD7:4KUu0eQcoAC7pSSwTv

Entry address:
0xA3E1A

Entry point:
E8, C6, 05, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 0C, 57, 85, C9, 0F, 84, 92, 00, 00, 00, 56, 53, 8B, D9, 8B, 74, 24, 14, F7, C6, 03, 00, 00, 00, 8B, 7C, 24, 10, 75, 0B, C1, E9, 02, 0F, 85, 85, 00, 00, 00, EB, 27, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 83, E9, 01, 74, 2B, 84, C0, 74, 2F, F7, C6, 03, 00, 00, 00, 75, E5, 8B, D9, C1, E9, 02, 75, 61, 83, E3, 03, 74, 13, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 84, C0, 74, 37, 83, EB, 01, 75, ED, 8B, 44, 24, 10...
 
[+]

Entropy:
6.5609

Code size:
796 KB (815,104 bytes)

Scheduled Task
Task name:
jollywallet-codedownloader

Trigger:
Logon (Runs on logon)


The file jollywallet-codedownloader.exe has been discovered within the following program.

JollyWallet  by Radyoos Media Ltd.
Publisher's description - “JollyWallet is an online shopping tool that combines cash back, discounts and online coupons.”
www.jollywallet.com
76% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (52.216.65.58:80)

TCP (HTTP):
Connects to ip-50-63-202-33.ip.secureserver.net  (50.63.202.33:80)

Remove jollywallet-codedownloader.exe - Powered by Reason Core Security