Home / malware Adware:Win32/Eorezo
First posted on 15 February 2019.
Source: MicrosoftAliases :
Adware:Win32/Eorezo is also known as Win32/Adware.EoRezo.E application, AdWare.Win32.EoRezo, Adware-Eorezo, ADW_EOZERO.
Explanation :
Installation
The program creates these registry entries:
In subkey: HKLMSoftwareEoRezo
Sets value: "HostGUID"
With data: ""
In subkey: HKCUSoftwareEoRezo
Sets value: "LCID"
With data: ""
It also creates the mutex "EoRezo".
It installs itself as a Browser Helper Object (BHO) and creates the following registry entries:
In subkey: HKLMSOFTWAREClassesAppIDEoEngineBHO.DLL
Sets value: "AppID"
With data: "{afbb7970-789a-4264-ba70-e8127dece400}"
In subkey: HKLMSOFTWAREClassesAppID{AFBB7970-789A-4264-BA70-E8127DECE400}
Sets value: "(default)"
With data: "eoenginebho"
In subkey: HKLMSOFTWAREClassesCLSID{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Sets value: "(default)"
With data: "eobho class"
In subkey: HKLMSOFTWAREClassesCLSID{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}InprocServer32
Sets value: "(default)"
With data: ""
In subkey: HKLMSOFTWAREClassesCLSID{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}ProgID
Sets value: "(default)"
With data: "eoenginebho.eobho.1"
In subkey: HKLMSOFTWAREClassesCLSID{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}TypeLib
Sets value: "(default)"
With data: "{{18af7201-4f14-4bcf-93fe-45617cf259ff}}"
In subkey: HKLMSOFTWAREClassesCLSID{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}VersionIndependentProgID
Sets value: "(default)"
With data: "eoenginebho.eobho"
In subkey: HKLMSOFTWAREClassesEoEngineBHO.EOBHO
Sets value: "(default)"
With data: "eobho class"
In subkey: HKLMSOFTWAREClassesEoEngineBHO.EOBHO.1
Sets value: "(default)"
With data: "eobho class"
In subkey: HKLMSOFTWAREClassesEoEngineBHO.EOBHO.1CLSID
Sets value: "(default)"
With data: "{c10dc1f4-ccdf-4224-a24d-b23afc3573c8}"
In subkey: HKLMSOFTWAREClassesEoEngineBHO.EOBHOCLSID
Sets value: "(default)"
With data: "{c10dc1f4-ccdf-4224-a24d-b23afc3573c8}"
In subkey: HKLMSOFTWAREClassesEoEngineBHO.EOBHOCurVer
Sets value: "(default)"
With data: "eoenginebho.eobho.1"
In subkey: HKLMSOFTWAREClassesInterface{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}
Sets value: "(default)"
With data: "ieobho"
In subkey: HKLMSOFTWAREClassesInterface{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}ProxyStubClsid
Sets value: "(default)"
With data: "{00020424-0000-0000-c000-000000000046}"
In subkey: HKLMSOFTWAREClassesInterface{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}ProxyStubClsid32
Sets value: "(default)"
With data: "{00020424-0000-0000-c000-000000000046}"
In subkey: HKLMSOFTWAREClassesInterface{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}TypeLib
Sets value: "(default)"
With data: "{18af7201-4f14-4bcf-93fe-45617cf259ff}"
In subkey: HKLMSOFTWAREClassesTypeLib{18AF7201-4F14-4BCF-93FE-45617CF259FF}1.0
Sets value: "(default)"
With data: "eoenginebho 1.0 type library"
In subkey: HKLMSOFTWAREClassesTypeLib{18AF7201-4F14-4BCF-93FE-45617CF259FF}1.0 win32
Sets value: "(default)"
With data: ""
In subkey: HKLMSOFTWAREClassesTypeLib{18AF7201-4F14-4BCF-93FE-45617CF259FF}1.0FLAGS
Sets value: "(default)"
With data: "0"
In subkey: HKLMSOFTWAREClassesTypeLib{18AF7201-4F14-4BCF-93FE-45617CF259FF}1.0HELPDIR
Sets value: "(default)"
With data: ""
In subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Sets value: "(default)"
With data: "eobho"
Behavior
The program is known to:
Display pop-up ads. Connect to certain servers, for example, eorezo.com and alpha00001.com. Change the home page and search engine used by Internet Explorer and Mozilla Firefox. Send out information about your PC to a remote server. Connect to a remote server to get configuration data.
Analysis by Jireh SanicoLast update 15 February 2019