jollywallet-buttonutil64.exe

Radyoos Media Ltd.

The application jollywallet-buttonutil64.exe by Radyoos Media has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
jollywallet  (signed by Radyoos Media Ltd.)

Product:
jollywallet

Description:
jollywallet exe

Version:
1000.1000.1000.1000

MD5:
5b798997eac9a1b88742844d48fff6cb

SHA-1:
7cd47b65a2d01ea24de3c61be7ed7feb20dd0ef9

SHA-256:
112ecca641ed31af16e3162d9683154942d83847dfd163f7842a59834686929a

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Part of the Crossrider toolbar platform. It will download and install new code and Javascript updates for the extension.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Radyoos Media Ltd..

Analysis date:
4/10/2025 7:27:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Crossrider.RadyoosMedia (M)
16.1.18.4

File size:
368.4 KB (377,192 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
jollywallet.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jollywallet\jollywallet-buttonutil64.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/12/2013 7:00:00 AM

Valid to:
2/12/2016 6:59:59 AM

Subject:
CN=Radyoos Media Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Radyoos Media Ltd., L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06C470BB28DFF4919F7971031170309C

File PE Metadata
Compilation timestamp:
9/11/2014 6:02:40 AM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:DnHJjus9CaO6wQ8z6ps0mjJxZiTi/+HTuXxlknr539deeKc7bAL:zNGNfdv/lxl69d/7EL

Entry address:
0x26168

Entry point:
48, 83, EC, 28, E8, A7, AC, 00, 00, 48, 83, C4, 28, E9, 02, 00, 00, 00, CC, CC, 48, 89, 5C, 24, 10, 48, 89, 74, 24, 18, 57, 48, 83, EC, 30, E8, 90, 20, 00, 00, 0F, B7, F0, B9, 02, 00, 00, 00, E8, 33, AC, 00, 00, B8, 4D, 5A, 00, 00, 48, 8D, 3D, 57, 9E, FD, FF, 66, 39, 05, 50, 9E, FD, FF, 74, 04, 33, DB, EB, 31, 48, 63, 05, 7F, 9E, FD, FF, 48, 03, C7, 81, 38, 50, 45, 00, 00, 75, EA, B9, 0B, 02, 00, 00, 66, 39, 48, 18, 75, DF, 33, DB, 83, B8, 84, 00, 00, 00, 0E, 76, 09, 39, 98, F8, 00, 00, 00, 0F, 95, C3, 89...
 
[+]

Entropy:
6.0408

Code size:
232.5 KB (238,080 bytes)

Remove jollywallet-buttonutil64.exe - Powered by Reason Core Security