setup_ospd_us.exe

Tuto4PC.com

This is the Eorezo installer which may include software offers for unwanted programs including toolbars. The application setup_ospd_us.exe by Tuto4PC.com has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the Eorezo Downloader installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from cdn.airdlr1.com.
Publisher:
Tuto4PC.com  (signed and verified)

MD5:
b23b400719dd66d8e0fe96c707e12fdc

SHA-1:
ef72a53127ded7b582bfa9389c520c55db682455

SHA-256:
29acad1de3526149317206587f065913ff528670850f638e6887a28eee61101d

Scanner detections:
24 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 12:00:53 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Eorezo.BZ
775

Agnitum Outpost
PUA.EoRezo
7.1.1

AhnLab V3 Security
PUP/Win32.Eorezo
2014.12.22

Avira AntiVirus
7.11.197.26

avast!
Win32:Adware-ASG [PUP]
2014.9-141221

AVG
Generic5
2015.0.3253

Bitdefender
Adware.Eorezo.BZ
1.0.20.1775

Comodo Security
ApplicUnwnt
20434

Dr.Web
Adware.Eorezo.413
9.0.1.0355

Emsisoft Anti-Malware
Adware.Eorezo.BZ
8.14.12.21.04

ESET NOD32
Win32/AdWare.EoRezo.AU (variant)
8.10911

F-Prot
W32/S-c61ac5f0
v6.4.7.1.166

F-Secure
Adware.Eorezo.BZ
11.2014-21-12_1

G Data
Adware.Eorezo.BZ
14.12.24

K7 AntiVirus
Adware
13.188.14395

Malwarebytes
PUP.Optional.Tuto4PC.A
v2014.12.21.04

McAfee
Artemis!B23B400719DD
5600.6909

MicroWorld eScan
Adware.Eorezo.BZ
15.0.0.1065

nProtect
Adware.Eorezo.BZ
14.12.19.01

Reason Heuristics
PUP.Installer.Tuto4PC.N
14.12.21.16

Sophos
Generic PUA HB
4.98

Trend Micro House Call
TROJ_GEN.R047H09L314
7.2.355

VIPRE Antivirus
Tuto4PC
35952

Zillya! Antivirus
Trojan.TDSS.Win32.42285
2.0.0.2012

File size:
3.1 MB (3,297,992 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Eorezo Downloader (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\yjazx9kbeg\setup_ospd_us.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
10/27/2014 6:32:39 AM

Valid to:
12/7/2015 10:27:40 AM

Subject:
E=contact@tuto4pc.com, CN=Tuto4PC.com, O=Tuto4PC.com, L=Paris, S=Ile-de-France, C=FR

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11214E18677190942D49073E30C52D17C351

File PE Metadata
Compilation timestamp:
6/19/1992 4:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:u5DbMePWp3V0mZJ33cTvfDqzpY1t2MVdOnRhJs7L:QDbPi3VxZJuvfDqzGt2MVdih8L

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.9980

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file setup_ospd_us.exe has been seen being distributed by the following URL.

Remove setup_ospd_us.exe - Powered by Reason Core Security