34a5587a-42b1-4d80-90d7-acfc980a4624.dll

Naruto Source

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The module 34a5587a-42b1-4d80-90d7-acfc980a4624.dll by Naruto Source has been detected as adware by 14 anti-malware scanners. This file is typically installed with the program power app by Naruto Source which is a potentially unwanted software program. The library is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
Naruto Source  (signed and verified)

MD5:
00e5492400fb0280ee8f2270053ded11

SHA-1:
74a5336f6f514f020ff01675f2425ef01ec7b7e1

SHA-256:
5190d71cc9c86ea95184af7ac5ed10c3e4465bcc1c6285d92f290fb80ed6caad

Scanner detections:
14 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
4/26/2024 7:15:14 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/CrossRider.pq
7.11.172.102

AVG
Generic
2015.0.3346

ESET NOD32
Win32/Toolbar.CrossRider.AI (variant)
8.10421

F-Prot
W32/A-6852ef88
v6.4.7.1.166

G Data
Win32.Adware.Crossrider
14.9.24

IKARUS anti.virus
AdWare.Win32.Crossrider
t3scan.1.7.8.0

K7 AntiVirus
Adware
13.183.13379

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3225

McAfee
Artemis!907AE737A4D1
5600.7002

Panda Antivirus
Trj/Genetic.gen
14.09.19.10

Qihoo 360 Security
Win32/Virus.Adware.970
1.0.0.1015

Reason Heuristics
PUP.NarutoSource.e
14.9.19.21

Sophos
Generic PUA MC
4.98

File size:
125.4 KB (128,360 bytes)

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\power app\34a5587a-42b1-4d80-90d7-acfc980a4624.dll

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/27/2014 8:00:00 PM

Valid to:
7/28/2015 7:59:59 PM

Subject:
CN=Naruto Source, O=Naruto Source, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1CE82906A7F364268F66771839675655

File PE Metadata
Compilation timestamp:
9/13/2014 6:04:22 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
1536:MLsSyIMXDxw0uT8dMyFIB5UkNW0WESG+QcNGtsWjcdPuanHcDNatfm6E:MLsXvGIdynYG+PGSP5n8DNaRmb

Entry address:
0x5B18

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, 8D, 38, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, 90, 8A, 01, 10, E8, D9, 14, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, B2, 01, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, 60, 40, 01, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.1018

Developed / compiled with:
Microsoft Visual C++

Code size:
71.5 KB (73,216 bytes)

The file 34a5587a-42b1-4d80-90d7-acfc980a4624.dll has been discovered within the following program.

power app  by Naruto Source
power app is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com/install/63439-power-app
79% remove it
 
Powered by Should I Remove It?

Remove 34a5587a-42b1-4d80-90d7-acfc980a4624.dll - Powered by Reason Core Security