f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe

power app

Naruto Source

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe by Naruto Source has been detected as adware by 27 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program power app by Naruto Source which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Object Browser  (signed by Naruto Source)

Product:
power app

Description:
power app exe

Version:
1000.1000.1000.1000

MD5:
c699c3f76beb5674501b2952e7be96f2

SHA-1:
ac695a5d37d3c0120d4a9021f5ff24e6d01a58ab

SHA-256:
04278695734505c9e21f70972b4f1c04cd176977f857331e140eebb0b89a47c9

Scanner detections:
27 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/26/2024 4:38:53 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Zusy.104862
796

Avira AntiVirus
Adware/CrossRider.pq
7.11.173.240

AVG
Generic
2015.0.3346

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.14919

Bitdefender
Gen:Variant.Adware.Zusy.104862
1.0.20.1670

Comodo Security
ApplicUnwnt
19597

Dr.Web
Trojan.Crossrider.31451
9.0.1.0262

Emsisoft Anti-Malware
Gen:Variant.Adware.Zusy.104862
8.14.11.30.03

ESET NOD32
Win32/Toolbar.CrossRider.AN (variant)
8.10453

Fortinet FortiGate
Adware/Adwapper
9/19/2014

F-Secure
Gen:Variant.Adware.Zusy.104862
11.2014-30-11_1

G Data
Gen:Variant.Adware.Zusy.104862
14.9.24

K7 AntiVirus
Trojan
13.183.13463

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3225

Malwarebytes
PUP.Optional.GoPhotoIT.A
v2014.09.19.09

McAfee
Artemis!01ABDEDB08F2
5600.7002

MicroWorld eScan
Gen:Variant.Adware.Zusy.104862
15.0.0.1002

NANO AntiVirus
Riskware.Win32.Crossrider.dfejgz
0.28.2.62286

Panda Antivirus
Trj/Genetic.gen
14.09.19.09

Qihoo 360 Security
Win32/Virus.Adware.970
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.g
14.9.19.21

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14917

Sophos
Generic PUA GM
4.98

Trend Micro House Call
TROJ_GEN.F0C2H00IM14
7.2.334

VIPRE Antivirus
Crossrider
33368

Zillya! Antivirus
Adware.Adwapper.Win32.161
2.0.0.1930

File size:
981.4 KB (1,004,904 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
power app.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\power app\f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/27/2014 8:00:00 PM

Valid to:
7/28/2015 7:59:59 PM

Subject:
CN=Naruto Source, O=Naruto Source, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1CE82906A7F364268F66771839675655

File PE Metadata
Compilation timestamp:
9/13/2014 6:04:03 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:6PFXzRdhxTD9B3y1yR9Xs3DCf2pSgFuxTb:6XzPTpBsyeA2pSg4Tb

Entry address:
0x8CA58

Entry point:
E8, C9, E5, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 40, D4, 4E, 00, E8, 82, 74, 00, 00, E8, 3E, 4E, 00, 00, 0F, B7, F0, 6A, 02, E8, 5C, E5, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 09, AC, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.6052

Code size:
708.5 KB (725,504 bytes)

Scheduled Task
Task name:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-5

Trigger:
Logon (Runs on logon)

Action:
f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe \rawdata=jctlbrj2dhhsjvhrl7ecgp+6glm0aothm4oh5vumd


The file f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe has been discovered within the following program.

power app  by Naruto Source
power app is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com/install/63439-power-app
79% remove it
 
Powered by Should I Remove It?

Remove f9afd838-d6cb-47bd-b134-bfd620a8cb27-5.exe - Powered by Reason Core Security