package_superpc_installer_multilang.exe

superpc

Tuto4PC.com

This is the Eorezo installer which may include software offers for unwanted programs including toolbars. The application package_superpc_installer_multilang.exe, “superpc Setup ” by Tuto4PC.com has been detected as adware by 34 anti-malware scanners. The program is a setup application that uses the Eorezo Downloader installer. It is also typically executed from the user's temporary directory.
Publisher:
Software   (signed by Tuto4PC.com)

Product:
superpc

Description:
superpc Setup

MD5:
61754a2fae838680c6b809614a3e66ae

SHA-1:
7af4c06f60c3da6616e819165df8f9cd5cd25150

SHA-256:
b9c74f31160f03a4dc9e73ce0ad4098fbaece83a80e7faabd47268dbd66ae500

Scanner detections:
34 / 68

Status:
Adware

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/27/2024 1:22:11 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Eorezo.BZ
675

AhnLab V3 Security
PUP/Win32.Eorezo
2014.12.16

Avira AntiVirus
ADWARE/EoRezo.Gen
7.11.195.232

avast!
Adware-ASG [PUP]
150319-1

AVG
Generic
2016.0.3153

Baidu Antivirus
Adware.Win32.EoRezo
4.0.3.15331

Bitdefender
Adware.Eorezo.BZ
1.0.20.450

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
ApplicUnwnt
20508

Dr.Web
Adware.Eorezo.414
9.0.1.05190

Emsisoft Anti-Malware
Adware.Eorezo.BZ
8.15.03.31.10

ESET NOD32
Win32/AdWare.EoRezo.AW application
7.0.302.0

Fortinet FortiGate
Riskware/EoRezo
3/31/2015

F-Prot
W32/Trojan2.OOHU
4.6.5.141

F-Secure
Adware.Eorezo.BZ
11.2015-31-03_3

G Data
Adware.Eorezo.BZ
15.3.24

IKARUS anti.virus
PUA.EoRezo
t3scan.1.8.5.0

K7 AntiVirus
Adware
13.187.14339

Malwarebytes
PUP.Optional.Tuto4PC.A
v2015.03.31.10

McAfee
Artemis!3F017966060B
5600.6809

MicroWorld eScan
Adware.Eorezo.BZ
16.0.0.270

NANO AntiVirus
Riskware.Text.Text.dozbeo
0.30.8.659

Norman
Adware.Eorezo.BZ
11.20150331

nProtect
Adware.Eorezo.BZ
14.12.15.01

Panda Antivirus
PUP/Tuto4PC
15.04.01.12

Qihoo 360 Security
HEUR/QVM06.1.Malware.Gen
1.0.0.1015

Quick Heal
PUA.AdwareEorezo.DC8
4.15.14.00

Reason Heuristics
PUP.Bundler.Eorezo
15.3.31.22

Rising Antivirus
PE:AdWare.Win32.Eorezo.a!1075356178
23.00.65.15329

Sophos
Generic PUA IJ
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-RemoteAdmin
9963

Trend Micro House Call
TROJ_GEN.R08NH09LF14
7.2.90

VIPRE Antivirus
Tuto4PC
35766

File size:
471 KB (482,304 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Eorezo Downloader (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\package_superpc_installer_multilang.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
10/27/2014 8:32:39 AM

Valid to:
12/7/2015 11:27:40 AM

Subject:
E=contact@tuto4pc.com, CN=Tuto4PC.com, O=Tuto4PC.com, L=Paris, S=Ile-de-France, C=FR

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11214E18677190942D49073E30C52D17C351

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:hQiGP0xP82FEILQi6zvC+MBTlPadSfXioRcpMXVJo:hQiOgfKUQXzvtMBTlP0QjcpMXVJo

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.9354

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

Remove package_superpc_installer_multilang.exe - Powered by Reason Core Security