jollywallet-codedownloader.exe

Radyoos Media Ltd.

The application jollywallet-codedownloader.exe by Radyoos Media has been detected as adware by 26 anti-malware scanners. This file is typically installed with the program JollyWallet by Radyoos Media Ltd. which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for jollywallet extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js.
Publisher:
jollywallet  (signed by Radyoos Media Ltd.)

Product:
jollywallet

Description:
jollywallet exe

Version:
1000.1000.1000.1000

MD5:
5a3d6a9f96703003414e6bd078edddf3

SHA-1:
a9796cdbbda4a2cdccba71c0659f899debbd4398

SHA-256:
94ca1da49a22b4b95b8415bf5dd1e99d35d86ab9f640719ab3ef1e4f41c7e713

Scanner detections:
26 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Radyoos Media Ltd..

Analysis date:
12/25/2024 12:36:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Application.Heur.Iu1@kqEKbfdO
784

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

Avira AntiVirus
Adware/CrossRider.A.4172
7.11.194.166

avast!
Win32:Crossrider-AG [PUP]
2014.9-141213

AVG
Generic5
2015.0.3262

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.141213

Bitdefender
Gen:Application.Heur.Iu1@kqEKbfdO
1.0.20.1735

Comodo Security
ApplicUnwnt
20338

Dr.Web
Trojan.Crossrider.7913
9.0.1.0347

ESET NOD32
Win32/Toolbar.CrossRider.AJ (variant)
8.10863

Fortinet FortiGate
Riskware/Toolbar_CrossRider
12/13/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

F-Secure
Gen:Application.Heur.Iu1@kqEKbfdO
11.2014-13-12_7

G Data
Gen:Application.Heur.Iu1@kqEKbfdO
14.12.24

K7 AntiVirus
Trojan
13.186.14309

Malwarebytes
PUP.Optional.JollyWallet.A
v2014.12.13.10

McAfee
Artemis!5A3D6A9F9670
5600.6918

MicroWorld eScan
Gen:Application.Heur.Iu1@kqEKbfdO
15.0.0.1041

NANO AntiVirus
Trojan.Win32.Crossrider.cwggis
0.28.6.63850

Panda Antivirus
Trj/Genetic.gen
14.12.13.10

Qihoo 360 Security
Win32/Virus.Adware.62b
1.0.0.1015

Reason Heuristics
PUP.Crossrider.RadyoosMedia.AA
14.12.13.10

Trend Micro House Call
TROJ_GEN.R0C1C0EJI14
7.2.347

Trend Micro
TROJ_GEN.R0C1C0EJI14
10.465.13

VIPRE Antivirus
Crossrider
35634

Zillya! Antivirus
Adware.CroRi.Win32.397
2.0.0.2003

File size:
557.9 KB (571,240 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
jollywallet.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jollywallet\jollywallet-codedownloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/12/2013 12:00:00 AM

Valid to:
2/11/2016 11:59:59 PM

Subject:
CN=Radyoos Media Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Radyoos Media Ltd., L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06C470BB28DFF4919F7971031170309C

File PE Metadata
Compilation timestamp:
2/13/2014 9:32:20 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:KU9iFTSTj8GO7xleh+FdHskm3ae/nXunb4mF6pTbb8uwxO:KU+TSTj8j3923rvkb3WTPwE

Entry address:
0x4DDEF

Entry point:
E8, CD, D4, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, F0, 60, 48, 00, E8, FB, 49, 00, 00, E8, 6F, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, 60, D4, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 8D, 7A, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4611

Code size:
436 KB (446,464 bytes)

The file jollywallet-codedownloader.exe has been discovered within the following program.

JollyWallet  by Radyoos Media Ltd.
Publisher's description - “JollyWallet is an online shopping tool that combines cash back, discounts and online coupons.”
www.jollywallet.com
76% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/004927/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove jollywallet-codedownloader.exe - Powered by Reason Core Security