CrossriderApp0033524.exe

IC Search - Prototype

Wolters Kluwer U.S Corporation

This is the Crossrider web browser extension installer that contains the files for installing a plugin for IE, Chrome and Firefox. It was built by developer (#33524) CCH Tax and Accounting at http://crossrider.com/install/33524. As part of the installing of the extensions, Crossrider may offer changes to your Internet browser settings. The application CrossriderApp0033524.exe, “IC Search - Prototype Installer” by Wolters Kluwer U.S has been detected as a potentially unwanted program by 14 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
CCH Tax and Accounting  (signed by Wolters Kluwer U.S Corporation)

Product:
IC Search - Prototype

Description:
IC Search - Prototype Installer

Version:
1.34.5.29

MD5:
115a73eabac5017ccfcc16431673b360

SHA-1:
ded584f6a8766f9d73979b75c37f5d4d62b87748

SHA-256:
845177afd94fbd1932ab6517a9331f251f465eac7b878211e4c08c7e7459969f

Scanner detections:
14 / 68

Status:
Potentially unwanted

Explanation:
Uses the Crossrider extension framework which may modify the browser's home, new tab and search pages as well as displays advertisements such as banner ads and text-links.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Wolters Kluwer U.S Corporation.

Analysis date:
11/24/2024 9:29:38 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Agent
7.1.1

Dr.Web
infected with Trojan.Crossrider.10029
9.0.1.05190

ESET NOD32
Win32/Packed.ScrambleWrapper.I potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/Agent
6/9/2014

K7 AntiVirus
Trojan
13.1712333

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.463

Malwarebytes
PUP.Optional.CrossRider
v2014.06.09.12

McAfee
Adware-Crossrider
5600.7105

NANO AntiVirus
Riskware.Win32.Agent.cxphnr
0.28.0.60100

Quick Heal
AdWare.Agent.r4 (Not a Virus)
6.14.14.00

Reason Heuristics
PUP.Installer.WoltersKluwerUSCorporation.U
14.6.1.21

Sophos
Generic PUA HI
4.98

Vba32 AntiVirus
AdWare.Agent
3.12.26.0

VIPRE Antivirus
Threat.4789396
30086

File size:
3.4 MB (3,590,720 bytes)

Copyright:
Copyright CCH Tax and Accounting

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\downloads\crossriderapp0033524.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
9/20/2011 5:00:00 PM

Valid to:
10/1/2014 4:59:59 PM

Subject:
CN=Wolters Kluwer U.S Corporation, OU=CCH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Wolters Kluwer U.S Corporation, L=Cedar Rapids, S=Iowa, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2F9E53FA481802756658FD00E69311B0

File PE Metadata
Compilation timestamp:
12/4/2012 5:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
98304:RvM9T2ZdT1NuGsiCQsrKWYZ0S70DpMTExfL:Rkh2Zh1oGs9dKWYZ0SUMqj

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9907  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The file CrossriderApp0033524.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to stats.statsmyapp.com  (176.32.99.156:80)

TCP (HTTP):
Connects to staging-app.crossrider.com  (149.126.72.103:80)

TCP (HTTP):
Connects to crossrider.com  (199.83.134.103:80)

 
http://crossrider.com/apps/33524/thank_you_page

Remove CrossriderApp0033524.exe - Powered by Reason Core Security