f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe

power app

Naruto Source

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe by Naruto Source has been detected as adware by 22 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program power app by Naruto Source which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Object Browser  (signed by Naruto Source)

Product:
power app

Description:
power app exe

Version:
1000.1000.1000.1000

MD5:
1d4bd3c769d496d1b91199af4e2bd981

SHA-1:
5de25f0e21b484985b71c9dca9b35053ba022cca

SHA-256:
2cdf9ec02010c3971f39f34588834b2b530da28d5363f147887ba87092cb9e0f

Scanner detections:
22 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/26/2024 11:27:48 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.CrossRider
2014.09.15

Avira AntiVirus
Adware/CrossRider.pq
7.11.171.252

AVG
Generic
2015.0.3346

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.14919

Comodo Security
ApplicUnwnt
19557

Dr.Web
Trojan.Crossrider.31451
9.0.1.0262

ESET NOD32
Win32/Toolbar.CrossRider.AQ potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Adware/Adwapper
9/19/2014

G Data
Win32.Adware.Crossrider
14.9.24

herdProtect (fuzzy)
2014.11.30.19

IKARUS anti.virus
Trojan.GoogUpdate
t3scan.1.7.8.0

K7 AntiVirus
Adware
13.183.13358

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3225

Malwarebytes
PUP.Optional.Sense.A
v2014.09.19.09

McAfee
Artemis!1D4BD3C769D4
5600.7002

NANO AntiVirus
Trojan.Win32.GoogUpdate.dfdvht
0.28.2.62151

Panda Antivirus
Trj/Chgt.F
14.09.19.09

Qihoo 360 Security
Win32/Virus.Adware.970
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.g
14.9.19.21

Sophos
Generic PUA FN
4.98

VIPRE Antivirus
Threat.4789396
33120

Zillya! Antivirus
Adware.Adwapper.Win32.223
2.0.0.1927

File size:
1.4 MB (1,511,272 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
power app.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\power app\f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/27/2014 8:00:00 PM

Valid to:
7/28/2015 7:59:59 PM

Subject:
CN=Naruto Source, O=Naruto Source, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1CE82906A7F364268F66771839675655

File PE Metadata
Compilation timestamp:
9/13/2014 6:04:26 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:GknpNueZEEEzV1vUa0dx96tA98GPvuTxb9p6dLumm7MQCY+7MpSoFTrbM:GknpdEzrvxw6qyGPvuNn6wmo+7MpSoFo

Entry address:
0xED3A0

Entry point:
E8, B9, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, EC, 01, 01, 00, 3B, 30, 7C, 07, E8, E3, 01, 01, 00, 8B, 30, E8, D6, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 34, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, C0, 0D, 55, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7E, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, C0, 0D, 55, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, 35, EE...
 
[+]

Entropy:
6.6134

Code size:
1.1 MB (1,135,616 bytes)

Scheduled Task
Task name:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-4

Trigger:
Logon (Runs on logon)

Action:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe \rawdata=lykxtulqbw4af9le4cz98ysqgfkg\+uzayfpfehsu


The file f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe has been discovered within the following program.

power app  by Naruto Source
power app is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com/install/63439-power-app
79% remove it
 
Powered by Should I Remove It?

Remove f9afd838-d6cb-47bd-b134-bfd620a8cb27-4.exe - Powered by Reason Core Security