Labeled: Undesirable, LPI, Optional, PUP
- This topic contains 0 replies, 1 participant, and was last updated by Nicholas Coolman, 3 years and 8 months ago.
-
AuthorMessages
-
-
July 31 2020 to 18 05 h min #26641Nicholas CoolmanKey Master
The programme PodoWeb falls into the category of Potentially Unwanted Optional Software (LPI/PUP).
LPIs, or PUPs, typically install as a program or browser extension and are loaded each time the operating system is started.
Potentially Unwanted Software (PUP/LPI) can launch services, start scheduled tasks, and create shortcuts on your Desktop. All these operations are done with or without your consent according to the terms of its user contract. Once installed, an LPI can modify certain parameters of your browsers such as search pages, the start page or even your error page. It can collect your browsing habits and communicate them to a server using the tracking method. While browsing, it may display advertisements (coupons) and advertising banners (popups). The goal of this program is often to make money by generating web traffic to sponsored sites.
Potentially unwanted software (LPI) or Potentialy Unwanted Programs (PUP) are the cause of many infections.
The most common example is adware. InstallCore, Crossrider, Graftor ou Boxore which pollute the Registry and your data storage units. They are usually installed without your knowledge by downloading freeware. Indeed some sites use the repackaging method, an operation which consists of redoing the software installation module by adding download options. These options allow you to add other software such as browser toolbars, adware, potentially unwanted software, intrusive advertising software, or even browser hijackers.
Spyware (spyware) and adware (adwares) unwanted files, just like malware, can use the writing flaws of legitimate software or those of operating systems. It is therefore essential to have official software and that it has automatic updating. Likewise, your Windows operating system must be programmed in automatic update mode and activated, so that you can have the latest updates for critical security vulnerabilities.Main PodoWeb actions:
– It installs as a process launched at system startup (RP),
– It modifies the start page of the Internet Explorer browser (R0),
– It modifies the search page of the Internet Explorer (R1) browser,
– It installs a plugin for the Mozilla Firefox (M3) browser,
- It installs an extension program for the Google Chrome (G2) browser,
- It is installed as Browser Helper Object (BHO) of Internet Browser (O2),
- It is installed as a service to be launched each time the system starts (O23), (SS/SR),
- It installs as a program (O42)
– It creates multiple “Software” registry keys,
- Adds additional folders (O43),
- Registration in the Windows prefetcher folder (O45)
– It creates multiple user files (O61),
– It creates a Legacy key in the Registry pointing to a malware service (O64),
– It creates Tracing (O100) registry keys
– It creates CLSID registry keys (O101)ZHPDiag overview for PodoWeb:
[MD5.DF09CE907803492420A7C3B8AFEFB083] – (…) — C:\Program Files (x86)\PodoWeb\updatePodoWeb.exe [323352] [PID.11516]
[MD5.DF09CE907803492420A7C3B8AFEFB083] – (…) — C:\Program Files (x86)\PodoWeb\bin\utilPodoWeb.exe [323352] [PID.5788]
[MD5.38D48AC6D35F727F1D12A702D8302BE0] – (…) — C:\Program Files (x86)\PodoWeb\bin\PodoWeb.BrowserAdapter.exe [98584] [PID.1708]
O2 – BHO: PodoWeb [64Bits] – {dfa18288-f10d-46f3-a28e-a197c78c5a13}. (.PodoWeb – PodoWeb.) — C:\Program Files (x86)\PodoWeb\PodoWebBHO.dll
O23 – Service: Update PodoWeb (Update PodoWeb). (…) – C:\Program Files (x86)\PodoWeb\updatePodoWeb.exe
O23 – Service: Util PodoWeb (Util PodoWeb). (…) – C:\Program Files (x86)\PodoWeb\bin\utilPodoWeb.exe
O42 – Software: PodoWeb – (.PodoWeb.) [HKLM][64Bits] — PodoWeb
[HKCU\Software\PodoWeb]
[HKLM\Software\Wow6432Node\PodoWeb]
O43 – CFD: 21/08/2014 – 15:51:46 – [] —-D C:\Program Files (x86)\PodoWeb
O61 – LFC: 21/08/2014 – 07:05:30 —A- . (…) — C:\Users\Coolman\AppData\Local\Google\Chrome\User Data\Default\Extensions\{random}\1.0.1_0\background.js [235]
O61 – LFC: 21/08/2014 – 07:05:30 —A- . (…) — C:\Users\Coolman\AppData\Local\Google\Chrome\User Data\Default\Extensions\{random}\1.0.1_0\content.js [271]
O61 – LFC: 21/08/2014 – 07:05:30 —A- . (…) — C:\Users\Coolman\AppData\Local\Google\Chrome\User Data\Default\Extensions\{random}\1.0.1_0\icon.png [1329]
O61 – LFC: 21/08/2014 – 07:05:30 —A- . (…) — C:\Users\Coolman\AppData\Local\Google\Chrome\User Data\Default\Extensions\{random}\1.0.1_0\manifest.json
O61 – LFC: 21/08/2014 – 03:48:57 —A- . (…) — C:\Users\Coolman\AppData\Local\Temp\n7093\PodoWeb_0104-57366623.exe [473688]
O64 – Services: CurCS – 21/08/2014 – C:\Program Files\PodoWeb\updatePodoWeb.exe (Update PodoWeb).(…) – LEGACY_UPDATE_PodoWeb
O64 – Services: CurCS – 21/08/2014 – C:\Program Files\PodoWeb\bin\utilPodoWeb.exe (Util PodoWeb).(…) – LEGACY_UTIL_PodoWeb
SR – | Auto 21/08/2014 323352 | (Update PodoWeb). (…) – C:\Program Files (x86)\PodoWeb\updatePodoWeb.exe
SR – | Auto 21/08/2014 323352 | (User PodoWeb). (…) – C:\Program Files (x86)\PodoWeb\bin\utilPodoWeb.exe
HKLM\SOFTWARE\Microsoft\Tracing\PodoWeb_RASAPI32
HKLM\SOFTWARE\Microsoft\Tracing\PodoWeb_RASMANCS
HKLM\SOFTWARE\Microsoft\Tracing\updatePodoWeb_RASAPI32
HKLM\SOFTWARE\Microsoft\Tracing\updatePodoWeb_RASMANCS
HKLM\SOFTWARE\Microsoft\Tracing\utilPodoWeb_RASAPI32
HKLM\SOFTWARE\Microsoft\Tracing\utilPodoWeb_RASMANCS
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\PodoWeb]
[HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{dfa18288-f10d-46f3-a28e-a197c78c5a13}]
[HKLM\Software\Classes\CLSID\{dfa18288-f10d-46f3-a28e-a197c78c5a13}]
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{dfa18288-f10d-46f3-a28e-a197c78c5a13}]
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{dfa18288-f10d-46f3-a28e-a197c78c5a13}]
[HKLM\SYSTEM\CurrentControlSet\Services\Update PodoWeb]
[HKLM\SYSTEM\CurrentControlSet\Services\Util PodoWeb]
[HKCU\Software\PodoWeb]
[HKLM\Software\Wow6432Node\PodoWeb]
C:\Program Files\PodoWeb
C:\Program Files (x86)\PodoWeb
C:\Program Files (x86)\PodoWeb\updatePodoWeb.exe
C:\Program Files (x86)\PodoWeb\bin\utilPodoWeb.exe
C:\Program Files (x86)\PodoWeb\PodoWebBHO.dllPodoWeb alias:
PUP.Optional.PodoWeb.A [Malwarebytes]
PUP.Optional.Sambreel (Malwarebytes)
Adware.PodoWeb [Malwarebytes]
Adware.SuperWeb [Malwarebytes]
Adware.SambreelDiagnose with ZHPSuite... Uninstall with Windows... Delete with ZHPCleaner... Remove with Malwarebytes...
Free support forum
Nicholas Coolman
-
-
AuthorMessages
- You must be logged in to reply to this topic.