{"id":22070,"date":"2024-05-15T20:59:19","date_gmt":"2024-05-15T20:59:19","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=22070"},"modified":"2024-05-16T20:29:36","modified_gmt":"2024-05-16T20:29:36","slug":"puadlmanager-win32-sepdot","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/puadlmanager-win32-sepdot\/","title":{"rendered":"PUADLManager:Win32\/Sepdot"},"content":{"rendered":"<p><strong>PUADLManager:Win32\/Sepdot is a potentially unwanted application<\/strong> that installs additional software. It specifically flags an application software that handles software bundling functionality. Sepdot is often packed into freeware applications or pirated software.<\/p>\n<p>Potentially unwanted applications may look like less dangerous threats, but they can still create the problems. Intrusive advertisements, tracking users&#8217; online activity, harvesting personal information \u2013 all this is among the most common symptoms. Sepdot should be removed as fast as any other thing detected by antivirus programs.<\/p>\n<h2>PUADLManager:Win32\/Sepdot Overview<\/h2>\n<p>PUADLManager:Win32\/Sepdot is a detection that Microsoft Defender uses to detect <a href=\"https:\/\/gridinsoft.com\/unwanted-program\">potentially unwanted software<\/a>. As the name suggests, this unwanted application is a package installer. It is most often distributed in freeware applications or <a href=\"https:\/\/gridinsoft.com\/blogs\/torrenting-is-it-legal\/\">pirated software<\/a>. The peculiarity of such installers is that all the processes of downloading additional software are performed in the background, without the user&#8217;s permission.<\/p>\n<figure id=\"attachment_22081\" aria-describedby=\"caption-attachment-22081\" style=\"width: 438px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/05\/Sepdot.webp\" alt=\"PUADLManager:Win32\/Sepdot detection window screenshot\" width=\"438\" height=\"429\" class=\"size-full wp-image-22081\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/05\/Sepdot.webp 438w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/05\/Sepdot-300x294.webp 300w\" sizes=\"auto, (max-width: 438px) 100vw, 438px\" \/><figcaption id=\"caption-attachment-22081\" class=\"wp-caption-text\">PUADLManager:Win32\/Sepdot detection window<\/figcaption><\/figure>\n<p>Unwanted apps that Sepdot installs can unleash <strong>a barrage of intrusive advertisements<\/strong>, track user&#8217;s online activity, and even harvest some personal information. Sometimes, it may offer seemingly helpful functionality, such as driver updating, system cleaning or tweaking Windows interface. However, these are mere facades with no real performance value. Having them running in the system exposes you to significant risk.<\/p>\n<h2>Technical Analysis<\/h2>\n<p>To understand how PUADLManager:Win32\/Sepdot works, let&#8217;s test <a href=\"https:\/\/www.virustotal.com\/gui\/file\/13187f46a25a935bd76936a1ee49b700135bd894abc4a37fa0945599c568fcf7\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">a sample of one<\/a> on a virtual machine. This particular example is a program for downloading videos from popular online services. The functionality of Sepdot is pretty similar to other bundlers, though there are still some differences. The initial infection vector starts with the user running <a href=\"https:\/\/www.joesandbox.com\/analysis\/505655\/0\/html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">the infected file<\/a>.<\/p>\n<h3>Persistence And Privilege Escalation<\/h3>\n<p>Sepdot creates processes and files in system directories to gain persistence and increase privileges. In particular, it drops the following files into temporary directories and directories of some programs:<\/p>\n<p><code style=\"font-size: 14px\">%USERPROFILE%\\AppData\\Local\\Temp\\aTube_Catcher_files<br \/>\n%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll<br \/>\nC:\\Program Files (x86)\\Google\\GoogleUpdater\\122.0.6234.0\\updater.exe<br \/>\nC:\\Program Files (x86)\\Microsoft\\Temp\\EU4D43.tmp\\MicrosoftEdgeUpdate.exe<\/code><\/p>\n<p>In addition to these files, the malware <strong>drops many DLL<\/strong> files and changes certain specific registry values. Such actions allow PUADLManager:Win32\/Sepdot to legitimize its presence in the system.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\APPID\\MicrosoftEdgeUpdate.exe\\AppID<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\APPID\\{A6B716CB-028B-404D-B72C-50E153DD68DA}\\ServiceParameters<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\WOW6432Node\\CLSID\\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\\LocalizedString<\/code><\/p>\n<h3>Data Collection<\/h3>\n<p>Sepdot collects quite a lot of information about the system, particularly about the user profile, hardware configuration and Windows version. I would suppose that this is purely for fingerprinting the system.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\Display<br \/>\nHKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\FipsAlgorithmPolicy\\Enabled<br \/>\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\SystemInformation<br \/>\nHKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\ComputerName\\ActiveComputerName<\/code><\/p>\n<p>The sample does not check values such as BIOS version or other low-level values, but the above registry keys provide comprehensive information about the device it is running. It does not look like VM\/debugger evasion either, as the thing does not check any related registry values.<\/p>\n<h3>Impact<\/h3>\n<p>The effect on the target system is similar to other bundlers. PUADLManager:Win32\/Sepdot downloads and installs <strong>various potentially unwanted programs<\/strong> along with the main program. Moreover, based on the collected data, this thing downloads and installs &#8220;relevant&#8221; unwanted software for the user.<\/p>\n<p>Since some services depend on geographical location, this approach allows the most favorable use of the additional software installer&#8217;s capabilities. For example, proxies allow the bypassing of regional restrictions. In suitable cases, Sepdot will install proxyware like Stopabit or <a href=\"https:\/\/gridinsoft.com\/blogs\/taskbarify-explained-removal\/\">Taskbarify<\/a> on such a system.<\/p>\n<figure id=\"attachment_20509\" aria-describedby=\"caption-attachment-20509\" style=\"width: 1002px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/taskbarify-descript1.webp\" alt=\"Taskbarify description\" width=\"1002\" height=\"596\" class=\"size-full wp-image-20509\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/taskbarify-descript1.webp 1002w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/taskbarify-descript1-300x178.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/taskbarify-descript1-768x457.webp 768w\" sizes=\"auto, (max-width: 1002px) 100vw, 1002px\" \/><figcaption id=\"caption-attachment-20509\" class=\"wp-caption-text\">Window of Taskbarify app &#8211; one of several PUAs that Sepdot installed on the test system<\/figcaption><\/figure>\n<p>In other cases, the bundler may introduce adware-like apps or rogue software (fake browsers, system cleaners, etc). Their name explain themselves pretty well, though almost all such apps will collect excessive telemetrics from the user machine.<\/p>\n<h2>How To Remove PUADLManager:Win32\/Sepdot?<\/h2>\n<p>To remove PUADLManager:Win32\/Sepdot, you will need an advanced anti-malware tool. GridinSoft Anti-Malware will be the best option, as it can repel with ease even those unwanted apps that other antiviruses ignore. Download Gridinsoft Anti-Malware and run a Full scan. Besides scanning, you can reset your browsers and HOSTS file in the program, which will help eliminate traces of malicious activity in a few clicks.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"PUADLManager:Win32\/Sepdot\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PUADLManager:Win32\/Sepdot is a potentially unwanted application that installs additional software. It specifically flags an application software that handles software bundling functionality. Sepdot is often packed into freeware applications or pirated software. Potentially unwanted applications may look like less dangerous threats, but they can still create the problems. Intrusive advertisements, tracking users&#8217; online activity, harvesting personal [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":22151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17,4],"tags":[474,223],"class_list":{"0":"post-22070","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"category-tips-tricks","9":"tag-unwanted-programs","10":"tag-windows-defender"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/05\/GS_Blog_banner_PUADLManager_Win32_Sepdot.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/22070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=22070"}],"version-history":[{"count":25,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/22070\/revisions"}],"predecessor-version":[{"id":22179,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/22070\/revisions\/22179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/22151"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=22070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=22070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=22070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}