f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe

power app

Naruto Source

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe by Naruto Source has been detected as adware by 22 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program power app by Naruto Source which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
Object Browser  (signed by Naruto Source)

Product:
power app

Description:
power app exe

Version:
1000.1000.1000.1000

MD5:
f58775f942c442ef918e32938db1a835

SHA-1:
ba7181b43b9aa4c8cd1d9a2317ea6420d525cafe

SHA-256:
614ecb5d28ab3712239b65e0b4b23c453f113d8fe83dcf5256328e270605b5d5

Scanner detections:
22 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
4/26/2024 9:25:31 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.CrossRider
2014.09.20

Avira AntiVirus
Adware/CrossRider.pq
7.11.173.116

AVG
Generic
2015.0.3346

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.14919

Comodo Security
ApplicUnwnt
19557

Dr.Web
Trojan.Crossrider.32967
9.0.1.0262

ESET NOD32
Win32/Toolbar.CrossRider.AQ (variant)
8.10443

Fortinet FortiGate
Adware/Adwapper
9/19/2014

G Data
Win32.Adware.Crossrider
14.9.24

herdProtect (fuzzy)
2014.11.30.19

IKARUS anti.virus
Trojan.GoogUpdate
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13432

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3225

Malwarebytes
PUP.Optional.PowerApp.A
v2014.09.19.09

McAfee
Artemis!F58775F942C4
5600.7002

NANO AntiVirus
Riskware.Win32.Crossrider.dfdexc
0.28.2.62151

Panda Antivirus
Trj/Genetic.gen
14.09.19.09

Qihoo 360 Security
Win32/Virus.Adware.970
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.h
14.9.19.21

Sophos
Generic PUA LK
4.98

VIPRE Antivirus
Crossrider
33264

Zillya! Antivirus
Adware.Adwapper.Win32.163
2.0.0.1927

File size:
1.9 MB (1,962,856 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
power app.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\power app\f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/27/2014 8:00:00 PM

Valid to:
7/28/2015 7:59:59 PM

Subject:
CN=Naruto Source, O=Naruto Source, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1CE82906A7F364268F66771839675655

File PE Metadata
Compilation timestamp:
9/13/2014 6:05:19 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:PsFPpNNmusqYHFL3lMoqpS4GTGUzn+nPRxG:PsJpeB/lLLH

Entry address:
0xEC604

Entry point:
E8, 3C, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 6F, 01, 01, 00, 3B, 30, 7C, 07, E8, 66, 01, 01, 00, 8B, 30, E8, 59, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 40, 13, 55, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 40, 13, 55, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, D3, ED...
 
[+]

Entropy:
6.8610

Code size:
1.1 MB (1,135,616 bytes)

Scheduled Task
Task name:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-11

Trigger:
Logon (Runs on logon)

Action:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe \rawdata=ex5zylp5lji6fhsixkasgef3p7evxouzogzqfr1fc


The file f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe has been discovered within the following program.

power app  by Naruto Source
power app is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com/install/63439-power-app
79% remove it
 
Powered by Should I Remove It?

Remove f9afd838-d6cb-47bd-b134-bfd620a8cb27-11.exe - Powered by Reason Core Security