Home Malware Programs Adware Sendori

Sendori

Posted: September 21, 2012

Threat Metric

Ranking: 12,232
Threat Level: 2/10
Infected PCs: 9,614
First Seen: September 21, 2012
Last Seen: March 10, 2025
OS(es) Affected: Windows

Sendori Screenshot 1Sendori is a PUP that disguises its redirects under the supposed feature of protecting your browser from mistyped Web addresses. As an unusually invasive browser hijacker that actively interferes with your browser, Sendori should be treated as a low-level threat, and anti-malware software is recommended for deleting Sendori and the browser changes Sendori implements to promote third party websites.

Sendori: Sending You to a Place You Don't Need to Go on the Flimsiest of Pretexts

SpywareRemove.com malware experts have had numerous encounters with browser hijackers in the past, but Sendori is a unique case of such for being packaged as a supposedly beneficial application. Besides making claims of redirecting your browser away from malicious websites that squat on mistyped Web addresses, Sendori also claims that Sendori can enhance the speed of your Web-browsing and website-loading, thus making a large overall improvement to your Internet experience. While these features would be impressive if they were true, malware experts depressingly found a much more tawdry reality than that behind Sendori's feature set.

While some of Sendori's URL redirects are legitimate, Sendori also has been known to redirect its users away from various legitimate websites – naturally, without your consent or any ability to control when the redirects are triggered. In addition, Sendori also uses Web traffic-monitoring functions that may slow down your browser instead of speeding it up and makes various difficult-to-remove network settings changes. Finally, Sendori does not actually make relevant searches for sites that you're trying to load and chooses its destinations by redirecting you to pre-determined lists of affiliated websites.

Sending Sendori Back Where It Belongs

Good Web-browsing habits also can help you to avoid any needless brushes with Sendori and its needless browser redirects. Online advertisements that ask you to install software, file attachments delivered through spam e-mail and social networking links leading to unrecognized websites are some potential infection vectors for Sendori.

Aliases

Sendori.D5D [AVG]

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\7279455e49c9f264afd96f\AdwCleaner\Quarantine\v1\20180728.193923\182\Sendori\SendoriSvc.exe#2EFC4C0BCD7430E6 File name: SendoriSvc.exe#2EFC4C0BCD7430E6
Size: 98.16 KB (98168 bytes)
MD5: 0d351368204f4302a5420276c1605983
Detection count: 354
Mime Type: unknown/exe#2EFC4C0BCD7430E6
Path: C:\7279455e49c9f264afd96f\AdwCleaner\Quarantine\v1\20180728.193923\182\Sendori\SendoriSvc.exe#2EFC4C0BCD7430E6
Group: Malware file
Last Updated: December 16, 2021
C:\7279455e49c9f264afd96f\AdwCleaner\Quarantine\v1\20180728.193923\182\Sendori\SendoriTray.exe#47BE666000C3B187 File name: SendoriTray.exe#47BE666000C3B187
Size: 74.61 KB (74616 bytes)
MD5: 6cfdf39d074540a069b0f90c706e5eb4
Detection count: 293
Mime Type: unknown/exe#47BE666000C3B187
Path: C:\7279455e49c9f264afd96f\AdwCleaner\Quarantine\v1\20180728.193923\182\Sendori\SendoriTray.exe#47BE666000C3B187
Group: Malware file
Last Updated: December 16, 2021
%PROGRAMFILES(x86)%\Sendori\Uninstall.exe File name: Uninstall.exe
Size: 503.8 KB (503808 bytes)
MD5: b6d85c45f5a38668bd16b12d1fd8280e
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Sendori
Group: Malware file
Last Updated: March 10, 2014
%PROGRAMFILES(x86)%\Sendori\Sendori.Service.exe File name: Sendori.Service.exe
Size: 19.74 KB (19744 bytes)
MD5: 94b9c94cff09a36a53e5e43b5243c34a
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Sendori
Group: Malware file
Last Updated: March 10, 2014
%PROGRAMFILES(x86)%\Sendori\sndappv2.exe File name: sndappv2.exe
Size: 3.62 MB (3623200 bytes)
MD5: 7cf00506ab20f82d588ed5d16e9efab2
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Sendori
Group: Malware file
Last Updated: March 10, 2014
%PROGRAMFILES%\Sendori\SendoriTray.exe File name: SendoriTray.exe
Size: 83.23 KB (83232 bytes)
MD5: 1c33446d9b2f10ade8eb010c49adfb86
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Sendori
Group: Malware file
Last Updated: March 10, 2014

More files

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%WINDIR%\System32\Sendori[NUMBERS].dll%WINDIR%\SysWOW64\Sendori[NUMBERS].dllHKEY..\..\..\..{RegistryKeys}SOFTWARE\Dyn\Installed\SendoriSOFTWARE\Microsoft\Tracing\Sendori_RASAPI32SOFTWARE\Microsoft\Tracing\Sendori_RASMANCSSOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sendori TraySoftware\SendoriSOFTWARE\Wow6432Node\Dyn\Installed\SendoriSOFTWARE\Wow6432Node\Microsoft\Tracing\Sendori_RASAPI32SOFTWARE\Wow6432Node\Microsoft\Tracing\Sendori_RASMANCSSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Sendori TraySOFTWARE\Wow6432Node\SendoriSYSTEM\ControlSet001\services\Application SendoriSYSTEM\ControlSet001\services\eventlog\Application\SendoriServiceSYSTEM\ControlSet001\services\eventlog\SendoriLogsSYSTEM\ControlSet001\services\Service SendoriSYSTEM\CurrentControlSet\services\Application SendoriSYSTEM\CurrentControlSet\services\eventlog\Application\SendoriServiceSYSTEM\CurrentControlSet\services\eventlog\SendoriLogsSYSTEM\CurrentControlSet\services\Service SendoriHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Sendori

Additional Information

The following directories were created:
%ALLUSERSPROFILE%\Sendori%PROGRAMFILES%\Sendori%PROGRAMFILES(X86)%\Sendori
Loading...