Home Possibly Unwanted Program CrossRider

CrossRider

Posted: August 14, 2013

Threat Metric

Ranking: 620
Threat Level: 1/10
Infected PCs: 1,632,811
First Seen: August 14, 2013
Last Seen: October 17, 2023
OS(es) Affected: Windows


CrossRider is a multiple-browser platform used by various adware products, including some browser hijackers. Since CrossRider heavily emphasizes reducing the PC user's control over their Web browsers, malware experts ordinarily encourage deleting CrossRider toolbars and other, related products. Although CrossRider products may market themselves under a rainbow of colorful brand names, competent PC security solutions should have zero issues with identifying and uninstalling CrossRider derivatives of all types.

CrossRider: Riding Advertisements into Every Browser You Have

CrossRider is a JavaScript-based publishing platform that claims to allow developers to create 'new' browser products in a matter of minutes. Sadly, these products always fall under the category of browser hijackers, adware and other forms of Potentially Unwanted Programs that represent significant security disadvantages for their users. Malware experts are in an ongoing analysis of CrossRider's frequent product releases, including such samples as Radio Canyon Ads, Fraveen, Weather It Up, Savings Hero, LyricsMonkey, LyricsOn and LyricsContainer.

CrossRider modifies multiple Web browsers simultaneously, including Internet Explorer, Chrome and Firefox. Its modifications are variable with the version of CrossRider that's in use, but may include:

  • Browser redirects to advertising websites.
  • Having your browser's default search engine reset.
  • Having your browser's homepage reset.
  • Injecting additional advertisements into third-party Web pages unaffiliated with CrossRider products.

CrossRider, in all of its variants, is not threatening software. However, most PC security companies classify CrossRider products as PUPs or adware. Exposure to CrossRider advertisements may harm the performance of your browser or make your PC susceptible to scripted attacks, phishing tactics and other threats. Meanwhile, malware experts, consistently, find no real marketing or distribution efforts of repute on behalf of CrossRider products, and have found some trace evidence of CrossRider's company being involved in spambot-related activities.

Crossing CrossRider out of Your Web-Surfing Life

Because of the blatant undesirability of most adware, CrossRider may be installed in bundles with other products. These bundle installers won't always request your consent prior to installing their version of a CrossRider toolbar, and you may encounter them on illicit file-downloading networks or free file hosts with poor reputations. However, malware experts find that good brands of anti-adware and anti-malware scanners have excellent rates for detecting common CrossRider installers, as well as most individual variants of CrossRider. Because of their high flexibility in brand names, you shouldn't try to identify an individual CrossRider add-on by eye. However, any add-on that provides excessive advertisements or forces your browser to load an unwanted site may present a security risk for your PC.

The Crossrider platform may be used by adware developers to ensure that their apps run on Google Chrome, Opera, Internet Explorer, Safari and Mozilla Firefox and cover larger user-base. Applications detected as CrossRider are not considered as harmful because most of them function as private ad platforms for vendors or display ads to cover developing costs and stay free-of-charge. Programs that have the CrossRider tag are often deployed as additional components of freeware packages that most users install via the 'Express' or 'Typical' option. A few examples of adware powered CrossRider applications are Compare For Fun, Coupon Server and Coupon Champion. The programs labeled as variants of CrossRider can display banners, floating ad boxes, pop-up and pop-under windows, contextual and transitional commercials. Additionally, CrossRider may use tracking cookies, web beacons, and DOM storage data to help advertisers push targeted marketing content based on the online routine of PC users. Security experts advise users to remove CrossRider software by using a trusted anti-spyware utility to ensure the optimal performance of their web browser and stop unwanted ads from appearing.

In addition to targeting Windows users, the CrossRider adware also is available for Mac. Its core features are almost identical, but it does have some extra functionality that it needs to use to bypass Apple's security measures. Thankfully, CrossRider for Mac is not threatening in its current form. Still, some of its behavior is not typical for adware certainly – for example, it is able to spy on your OSX user credentials.

The Mac Adware Uses Fake Prompts to Collect Credentials

Due to the default security measures found in Apple's operating system, adware for Mac often may be involved in shadier behavior compared to its Windows counterparts. For example, CrossRider is known to display a fake login prompt, which is used to harvest the login credentials of Mac users – thankfully, they are not used to execute harmful attacks, but the fraudsters behind the adware will use the harvested login data to install additional adware components without the user's consent. Furthermore, in case the server used to serve the adware is compromised, an ill-minded actor may modify it to deliver more threatening malware such as ransomware or backdoor Trojans.

The CrossRider may be installed using different configurations depending on the recipient's operating system version. For example, if you use OSX 10.11 and above, the adware will use the aforementioned fake login prompt to collect your password, and then use it to deploy its components silently. One of these components is a fake copy of Safari that comes with a pre-installed list of add-ons that are meant to display advertisements whenever you use the browser. The bogus Safari version will replace the original one in every menu so that users who are not aware of the issue will end up seeing tons of advertisements.

Adaptive Adware Uses Different Tricks Depending on Your Operating System Version

Users of OSX versions prior to 10.10 will not see the fake login prompt and, instead, the CrossRider adware will initialize a script called 'install.sh' – its purpose is to apply changes to the Google Chrome and Safari Web browsers that concern their active extensions. All changes will be made off-screen so that the user will not see anything out of the ordinary.

Apart from displaying advertisements, the CrossRider adware also may collect data from the local computer – username, IP address, Web browser versions, OS version and the contents of the 'Applications' folder. Another worrying trait of CrossRider is its ability to identify the version of OSX's security components.

Mac adware is much more advanced than its Windows counterparts certainly – its authors use advanced techniques to bypass Apple's security measures, and Mac adware often may engage in shady behavior to gain the ability to install components without the user's approval. There is nothing stopping the adware's creators from deciding to use a more harmful payload, and it is crucial to take the required measures to prevent threats like this from entering your system incredibly.

Aliases

Crossrider.WFB [AVG]Trj/Genetic.gen [Panda]Trojan[Downloader:HEUR]/Win32.AGeneric [Antiy-AVL]W32/AppRider.CT [Fortinet]BehavesLike.Win32.ShopperPro.th [McAfee-GW-Edition]Trojan.Crossrider1.43107 [DrWeb]AppRider (PUA) [Sophos]not-a-virus:HEUR:AdWare.Win32.CrossRider.gen [Kaspersky]Win.Trojan.Troldesh-2 [ClamAV]Trojan.Gen.2 [Symantec]W32/S-d60a457c!Eldorado [F-Prot]Artemis!DC24DF79A82D [McAfee]Riskware/CrossRider [Fortinet]Artemis!7016A5D74459 [McAfee]PUP/Win32.CrossRider [AhnLab-V3]
More aliases (57)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Users\<username>\AppData\Local\Installer\Install_19591\DCytaiesmt_smtyc_setup.exe File name: DCytaiesmt_smtyc_setup.exe
Size: 1.22 MB (1222640 bytes)
MD5: ea0ca98847dc1a403ffec3be116e8b2f
Detection count: 7,317
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Installer\Install_19591\DCytaiesmt_smtyc_setup.exe
Group: Malware file
Last Updated: July 22, 2023
%PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2\2cac6850-ffcf-4e74-a8a7-4b644c0a229f-1-6.exe File name: 2cac6850-ffcf-4e74-a8a7-4b644c0a229f-1-6.exe
Size: 1.41 MB (1413080 bytes)
MD5: 4b9ec41cadd5b9b6def12fbdeb4cb95a
Detection count: 3,698
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2
Group: Malware file
Last Updated: May 7, 2020
%PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2\2cac6850-ffcf-4e74-a8a7-4b644c0a229f-1-7.exe File name: 2cac6850-ffcf-4e74-a8a7-4b644c0a229f-1-7.exe
Size: 1.1 MB (1104856 bytes)
MD5: fafb2ae235f914d74044af7aa31831f4
Detection count: 3,260
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2
Group: Malware file
Last Updated: May 7, 2020
%PROGRAMFILES(x86)%\CinemaP-1.8cV05.02\cf2f0c60-8b09-4897-ab0e-5643a89cf068-1-6.exe File name: cf2f0c60-8b09-4897-ab0e-5643a89cf068-1-6.exe
Size: 1.41 MB (1413080 bytes)
MD5: eadc29cedbb6bf00e84ae866c637f9bf
Detection count: 1,817
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\CinemaP-1.8cV05.02
Group: Malware file
Last Updated: March 23, 2016
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\w3NjmMN5jwhw9pYvby.exe File name: w3NjmMN5jwhw9pYvby.exe
Size: 1.57 MB (1579520 bytes)
MD5: 3a1d89b89c9d62951957f0839578dd9b
Detection count: 1,766
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\w3NjmMN5jwhw9pYvby.exe
Group: Malware file
Last Updated: October 12, 2023
%PROGRAMFILES(x86)%\HQ Cinema Video 1.9cV09.02\2ae81b89-e7fe-4ba1-8c55-04e02cb19118-1-6.exe File name: 2ae81b89-e7fe-4ba1-8c55-04e02cb19118-1-6.exe
Size: 1.41 MB (1413080 bytes)
MD5: 3f52805670502af0b57a04d1dc9eefc8
Detection count: 1,251
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\HQ Cinema Video 1.9cV09.02
Group: Malware file
Last Updated: March 23, 2016
%PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2\2cac6850-ffcf-4e74-a8a7-4b644c0a229f-6.exe File name: 2cac6850-ffcf-4e74-a8a7-4b644c0a229f-6.exe
Size: 1.42 MB (1420248 bytes)
MD5: 202d0e52dcc36fba2ff8c73d10218c49
Detection count: 1,246
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\MediaPlayerLtdEd1.2
Group: Malware file
Last Updated: May 7, 2020
G:\Master\Backup 08042015\RekaRumah\AppData\Roaming\WMo6KeWiTVRt1VLTZ5v.exe File name: WMo6KeWiTVRt1VLTZ5v.exe
Size: 1.57 MB (1577472 bytes)
MD5: 1bcc1f03714c5734db3e02eaca0e07e6
Detection count: 1,075
File type: Executable File
Mime Type: unknown/exe
Path: G:\Master\Backup 08042015\RekaRumah\AppData\Roaming\WMo6KeWiTVRt1VLTZ5v.exe
Group: Malware file
Last Updated: May 3, 2023
C:\Program Files\ShopperamaIsDaBest\shopperamaisdabest_helper_service.exe File name: shopperamaisdabest_helper_service.exe
Size: 191.71 KB (191719 bytes)
MD5: 7057bd7392002f0522aec901d92bcb3d
Detection count: 714
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files\ShopperamaIsDaBest\shopperamaisdabest_helper_service.exe
Group: Malware file
Last Updated: May 23, 2023
%PROGRAMFILES%\Cinema_Plus_3.1jV07.07\9f16ff19-5066-4529-83c9-5ba1bafb0295-3.exe File name: 9f16ff19-5066-4529-83c9-5ba1bafb0295-3.exe
Size: 1.3 MB (1308752 bytes)
MD5: 69d16d185e7d0abfa4782c37ee51dfbc
Detection count: 466
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Cinema_Plus_3.1jV07.07
Group: Malware file
Last Updated: July 8, 2017
%PROGRAMFILES(x86)%\winservice86\31bcb83d-30ea-44b4-ad08-0311a30b4210-12.exe File name: 31bcb83d-30ea-44b4-ad08-0311a30b4210-12.exe
Size: 671.19 KB (671192 bytes)
MD5: 2eaada9912138acd7374b8d549cdf295
Detection count: 185
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\winservice86
Group: Malware file
Last Updated: March 23, 2016
%PROGRAMFILES%\hosts\hosts-bg.exe File name: hosts-bg.exe
Size: 896 KB (896000 bytes)
MD5: 33fa2184f8cbe1325a5cc699873d0d45
Detection count: 64
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\hosts
Group: Malware file
Last Updated: August 3, 2017
%APPDATA%\dk.exe File name: dk.exe
Size: 1.47 MB (1477072 bytes)
MD5: da23bdd9c13d7fae63f720a1185a93b6
Detection count: 31
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: March 25, 2016
%APPDATA%\ipMpK2Wj.exe File name: ipMpK2Wj.exe
Size: 1.57 MB (1579008 bytes)
MD5: c6d6a6d0267d124cb8d5076b9672fd28
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 5, 2021
%APPDATA%\JG.exe File name: JG.exe
Size: 1.49 MB (1497560 bytes)
MD5: 05eccfb9cbbd401a115b4b44fa453d92
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: March 17, 2016
%APPDATA%\CCKxnhguMk.exe File name: CCKxnhguMk.exe
Size: 1.22 MB (1225216 bytes)
MD5: c7c516caad688d159d293d439ec5d426
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 25, 2020
%LOCALAPPDATA%\Installer\Install_28087\DCnsq681F.tmp File name: DCnsq681F.tmp
Size: 1.12 MB (1128448 bytes)
MD5: d7982f444bbe30ea82a8805d207aa1bd
Detection count: 12
File type: Temporary File
Mime Type: unknown/tmp
Path: %LOCALAPPDATA%\Installer\Install_28087
Group: Malware file
Last Updated: March 22, 2022
%PROGRAMFILES%\hosts\hosts-bho.dll File name: hosts-bho.dll
Size: 805.88 KB (805888 bytes)
MD5: 153c17029119f51589baa333e4a4fa1e
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\hosts
Group: Malware file
Last Updated: August 3, 2017

More files

Registry Modifications

The following newly produced Registry Values are:

CLSID{02A96331-0CA6-40E2-A87D-C224601985EB}{3278F5CF-48F3-4253-A6BB-004CE84AF492}{3B5702BA-7F4C-4D1A-B026-1E9A01D43978}{5645E0E7-FC12-43BF-A6E4-F9751942B298}{577975B8-C40E-43E6-B0DE-4C6B44088B52}{5E89ACE9-E16B-499A-87B4-0DBF742404C1}{69F256DF-BA98-45E9-86EA-FC3CFECF9D30}{6E87FC94-9866-49B9-8E93-5736D6DE3DD7}{7E49F793-B3CD-4BF7-8419-B34B8BD30E61}{834469E3-CA2B-4F21-A5CA-4F6F4DBCDE87}{8529FAA3-5BFD-43C1-AB35-B53C4B96C6E5}{ADBC39BE-3D20-4333-8D99-E91EB1B62474}{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}{CFC47BB5-5FB5-4AD0-8427-6AA04334A3FC}{E06CA7F5-BA34-4FF6-8D24-B1BDC594D91F}{E0ADB535-D7B5-4D8B-B15D-578BDD20D76A}{F6421EE5-A5BE-4D31-81D5-C16B7BF48E4C}{FD8E81D0-F5FE-4CB1-9AEA-1E163D2BAB78}File name without pathhttps_d19tqk5t6qcjac.cloudfront.net_0.localstoragehttps_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journalHKEY..\..\..\..{RegistryKeys}SOFTWARE\_CrossriderRegNamePlaceHolder_SOFTWARE\AppDataLow\Software\_CrossriderRegNamePlaceHolder_Software\AppDataLow\Software\CrossriderSoftware\ArenaHDSOFTWARE\Cinema_Plus-1.2V21.07Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Software\_CrossriderRegNamePlaceHolder_Software\Cr_InstallerSoftware\CrossriderSOFTWARE\HD4GoodSOFTWARE\HighDefActionSoftware\InstalledBrowserExtensions\215 AppsSoftware\InstalledBrowserExtensions\32846Software\InstalledBrowserExtensions\34087Software\InstalledBrowserExtensions\App+ServiceSoftware\InstalledBrowserExtensions\BrowserAppSPlusSoftware\InstalledBrowserExtensions\Buca AppsSoftware\InstalledBrowserExtensions\NewPlayerVideo+SOFTWARE\MediaPlayRS3SOFTWARE\MedPlayvidV3.1SOFTWARE\MyBrowser 1.0.2V31.10SOFTWARE\OpedBrowsrVersion5-nvSOFTWARE\OpedBrowsrVersion5-nv-ieSOFTWARE\Wow6432Node\AppDataLow\Software\CrossriderSOFTWARE\Wow6432Node\ArenaHDSOFTWARE\Wow6432Node\Cinema_Plus-1.2V21.07SOFTWARE\Wow6432Node\CrossriderSOFTWARE\Wow6432Node\HD4GoodSOFTWARE\Wow6432Node\HighDefActionSOFTWARE\Wow6432Node\InstalledBrowserExtensions\32846SOFTWARE\Wow6432Node\InstalledBrowserExtensions\34087SOFTWARE\Wow6432Node\MediaPlayRS3SOFTWARE\Wow6432Node\MedPlayvidV3.1SOFTWARE\Wow6432Node\MyBrowser 1.0.2V31.10SOFTWARE\Wow6432Node\YorkNewCinSoftware\YorkNewCinHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Cinema_Plus-1.2V21.07HD4GoodMediaPlayerVid2.4MediaPlayRS3MedPlayvidV3.1MyBrowser 1.0.2V31.10

Additional Information

The following directories were created:
%LOCALAPPDATA%\download balance%PROGRAMFILES%\48 dresses%PROGRAMFILES%\BrowsrPlus4%PROGRAMFILES%\CrossriderWebApps%PROGRAMFILES%\MedPlayvidV3.1%PROGRAMFILES%\MyBrowser 1.0.2V31.10%PROGRAMFILES%\compare for fun%PROGRAMFILES%\dr games%PROGRAMFILES%\dress4u%PROGRAMFILES%\ext coupons%PROGRAMFILES%\fun coupons%PROGRAMFILES%\helper king%PROGRAMFILES%\shopping blast%PROGRAMFILES%\web disco%PROGRAMFILES%\winter web%PROGRAMFILES(X86)%\MedPlayvidV3.1%PROGRAMFILES(X86)%\MyBrowser 1.0.2V31.10%PROGRAMFILES(x86)%\48 dresses%PROGRAMFILES(x86)%\CrossriderWebApps%PROGRAMFILES(x86)%\HQVidual2y-v2.5V11.11%PROGRAMFILES(x86)%\compare for fun%PROGRAMFILES(x86)%\dr games%PROGRAMFILES(x86)%\dress4u%PROGRAMFILES(x86)%\ext coupons%PROGRAMFILES(x86)%\fun coupons%PROGRAMFILES(x86)%\helper king%PROGRAMFILES(x86)%\shopping blast%PROGRAMFILES(x86)%\web disco%PROGRAMFILES(x86)%\winter web%programfiles%\OpedBrowsrVersion5
The following URL's were detected:
app.gencloudex.com/staticcrossriderManifestcrossriderapp

Related Posts

Loading...