Sendori

Sendori

http://sendori.com

Sendori is a cloud-based web service that helps people navigate to their favorite websites faster and protects them from malicious sites using proprietary web filtration technology. Simply type a brand, keyword or partial URL directly into your browser and Sendori delivers the correct website – every time.

Sendori operates a custom public Domain Name Server (DNS) infrastructure. Leveraging Anycast routing methodologies, DNSSEC security and an editorially curated directory, we deliver cutting edge name server technology. Deployed across seven geo-located facilities in the United States, we distribute traffic to multiple data centers providing some of the fastest uncached name resolution speeds available.

The Windows boot time has become slow than usually. Difference= 2 sec (-6%).

SENDORITRAY.EXE
Description: Sendori Notification Icon Sendori, Inc. Sendori 2.0.5
MD5= 4E0D4761CCFD3C085B058C30F4D6CD7C
File is signed and the signature was verified.
File size= 82792
Related registry changes:
HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\SENDORI TRAY: “”%PROGRAM FILES%\SENDORI\SENDORITRAY.EXE“”
SENDORISVC.EXE
Description: Service Application Sendori Sets and maintains Sendori protection on this computer. Start Type: loaded automatically by Server Manager Sendori Service Sendori, Inc. Sendori Service 2.0.5
MD5= 4D43EBBFE624FC12A68AA7BF82F7A5D1
File is signed and the signature was verified.
File size= 118632
Related registry changes:
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\APPLICATION SENDORI\IMAGEPATH: “%PROGRAM FILES%\SENDORI\SENDORISVC.EXE
SENDORI.SERVICE.EXE
Description: Service Service Sendori Service Sendori. Start Type: loaded automatically by Server Manager Sendori.Service sendori Sendori.Service 2.0.5.0
MD5= 4A9D0AC2EA3275EFE75D7446C3E08F02
File is signed and the signature was verified.
File size= 14696
Related registry changes:
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SERVICE SENDORI\IMAGEPATH: “%PROGRAM FILES%\SENDORI\SENDORI.SERVICE.EXE
SNDAPPV2.EXE
Description: Service sndappv2 Sets and maintains sndappv2 LSP protection on this computer. Start Type: loaded automatically by Server Manager sndappv2.exe Sendori sndappv2.exe 2.2.1.3
MD5= 69304446E04111DC3656F71570D1075A
File is signed and the signature was verified.
File size= 3569512
Related registry changes:
HKLM\SOFTWARE\CLASSES\APPID\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\APPID\SNDAPPV2.EXE\APPID: “{9DC8FA51-B596-4F77-802C-5B295919C205}”
HKLM\SOFTWARE\CLASSES\CLSID\{3E28F712-0D6C-4EE3-AC8C-8F060F5D7C33}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{6CE321DA-DC11-45C6-A0FC-4E8A7D978ABC}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{6EEBC7FF-67DA-4B90-9251-C2C5696E4B48}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{74137531-80F7-406F-9543-7D11385FA8C8}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{832599B2-55BF-4437-8F3E-030CF5AEB262}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{9B7B034B-944A-4261-B487-862F642F7615}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{B1A429DB-FB06-4645-B7C0-0CC405EAD3CD}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{DD67706E-819E-4EBD-BF8D-6D6147CC7A49}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\CLSID\{F62A4AF9-58B4-4FEC-89CC-D717A547D8E8}\LOCALSERVER32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SOFTWARE\CLASSES\TYPELIB\{ED721A76-8160-4DA0-A18E-7FD7C4574774}\1.0\0\WIN32\: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SNDAPPV2\IMAGEPATH: “%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
SENDORI.DLL
Description: Sendori.dll Sendori Sendori.dll 2.2.1.3
MD5= 0C741D387C51485C226D0966BB6C8FFC
File is signed and the signature was verified.
File size= 321384

Removed after installation:
HTTP.SYS
Description: HTTP Protocol Stack Microsoft Corporation Microsoft® Windows® Operating System 5.1.2600.5512
MD5= F6AACF5BCE2893E0C1754AFEB672E5C9
File size= 264832
Modified during installation:

~+ [NETWORK SETTINGS] [NAME SERVER] {0445ABC5-DCB0-4E8B-A5BE-DA7B973EBA30}=216.146.35.240,216.146.36.240,192.168.174.2
~- [NETWORK SETTINGS] [NAME SERVER] {0445ABC5-DCB0-4E8B-A5BE-DA7B973EBA30}=192.168.174.2

FILES ADDED:42

%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\BOOKMARKBACKUPS\BOOKMARKS-2012-12-12.JSON
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\F_000032
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\F_000033
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\F_000034
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\F_000035
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSION STATE\000012.LOG
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSION STATE\MANIFEST-000011
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000015.LOG
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000016.SST
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\MANIFEST-000013
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY INDEX 2012-12
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY INDEX 2012-12-JOURNAL
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\RECOVERY\LAST ACTIVE\{0ABD07C2-4433-11E2-BBF5-000C2982064B}.DAT
%TEMP%\REG11.TMP
%TEMP%\REG12.TMP
%TEMP%\SENDORILSP.INI.LOG
%TEMP%\SNDAPPV2R.LOG
%COMMON APPDATA%\SENDORI\CONFIG.SENDORI
%COMMON APPDATA%\SENDORI\LOGO.ICO
%COMMON APPDATA%\SENDORI\SENDORI.LOG
%PROGRAM FILES%\SENDORI\DYNLIB.DLL
%PROGRAM FILES%\SENDORI\INSTALL.LOG
%PROGRAM FILES%\SENDORI\INTEROP.PCPROXYLIB.DLL
%PROGRAM FILES%\SENDORI\PAD_FILE.XML
%PROGRAM FILES%\SENDORI\SENDORI.DLL
%PROGRAM FILES%\SENDORI\SENDORI.LIBRARY.DLL
%PROGRAM FILES%\SENDORI\SENDORI.SERVICE.EXE
%PROGRAM FILES%\SENDORI\SENDORI32.SYS
%PROGRAM FILES%\SENDORI\SENDORI32.SYS.WIN7
%PROGRAM FILES%\SENDORI\SENDORICONTROL.EXE
%PROGRAM FILES%\SENDORI\SENDORILSP.EXE
%PROGRAM FILES%\SENDORI\SENDORILSP.INI
%PROGRAM FILES%\SENDORI\SENDORILSP64.EXE
%PROGRAM FILES%\SENDORI\SENDORISVC.EXE
%PROGRAM FILES%\SENDORI\SENDORITRAY.EXE
%PROGRAM FILES%\SENDORI\SENDORIUP.EXE
%PROGRAM FILES%\SENDORI\SNDAPPV2.EXE
%PROGRAM FILES%\SENDORI\SPORDER.DLL
%PROGRAM FILES%\SENDORI\UNINSTALL.EXE
%SYSDIR%\SENDORI.DLL
%WinDir%\TEMP\SNDAPPV2.LOG
%WinDir%\TEMP\SNDAPPV2R.LOG

FILES DELETED:10

%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\F_000019
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSION STATE\000010.LOG
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSION STATE\MANIFEST-000009
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000005.SST
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000008.SST
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000011.SST
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\000012.LOG
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\MANIFEST-000010
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\RECOVERY\LAST ACTIVE\{8F05E1C8-FD97-11E1-BBED-000C2982064B}.DAT
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\RECOVERY\LAST ACTIVE\{8F05E1C9-FD97-11E1-BBED-000C2982064B}.DAT

FILES[ATTR]MODIFIED:56

%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\CERT8.DB
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\CHROMEAPPSSTORE.SQLITE
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\KEY3.DB
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\LOCALSTORE.RDF
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\PARENT.LOCK
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\PLUGINREG.DAT
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\PREFS.JS
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\SAVEDTELEMETRY.DAT.JSON
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\SESSIONSTORE.BAK
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\SESSIONSTORE.JS
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\TELEMETRY.SHUTDOWNTIME.TXT.TMP
%APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\URLCLASSIFIERKEY3.TXT
%PROFILE%\IECOMPATCACHE\INDEX.DAT
%PROFILE%\IETLDCACHE\INDEX.DAT
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\CHROME_SHUTDOWN_MS.TXT
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\DATA_0
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CACHE\DATA_1
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CURRENT SESSION
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\CURRENT TABS
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSION STATE\CURRENT
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\FAVICONS
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\FAVICONS-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY INDEX 2012-11
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY INDEX 2012-11-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY PROVIDER CACHE
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\HISTORY-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\LAST SESSION
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\LAST TABS
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\MANAGED MODE SETTINGS
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\NETWORK ACTION PREDICTOR
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\NETWORK ACTION PREDICTOR-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\PREFERENCES
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\SESSION STORAGE\CURRENT
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\WEB DATA
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\DEFAULT\WEB DATA-JOURNAL
%LOCAL APPDATA%\GOOGLE\CHROME\USER DATA\LOCAL STATE
%LOCAL APPDATA%\MICROSOFT\FEEDS\FEEDSSTORE.FEEDSDB-MS
%LOCAL APPDATA%\MICROSOFT\FEEDS\MICROSOFT FEEDS~\MICROSOFT AT HOME~.FEED-MS
%LOCAL APPDATA%\MICROSOFT\FEEDS\MICROSOFT FEEDS~\MICROSOFT AT WORK~.FEED-MS
%LOCAL APPDATA%\MICROSOFT\FEEDS\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\INTERNET EXPLORER SUGGESTED SITES~.FEED-MS
%LOCAL APPDATA%\MICROSOFT\FEEDS\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WEBSLICES~\WEB SLICE GALLERY~.FEED-MS
%LOCAL APPDATA%\MICROSOFT\FEEDS CACHE\INDEX.DAT
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\DOMSTORE\21OFN9AT\WWW.GOOGLE[1].XML
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\DOMSTORE\INDEX.DAT
%LOCAL APPDATA%\MICROSOFT\INTERNET EXPLORER\RECOVERY\LAST ACTIVE\RECOVERYSTORE.{05098E7E-95AD-11E1-BBE6-000C2982064B}.DAT
%LOCAL APPDATA%\MICROSOFT\WINDOWS\USRCLASS.DAT
%LOCAL APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\CACHE\_CACHE_003_
%LOCAL APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\CACHE\_CACHE_MAP_
%LOCAL APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\URLCLASSIFIER.PSET
%LOCAL APPDATA%\MOZILLA\FIREFOX\PROFILES\EOWSE1HO.DEFAULT\URLCLASSIFIER3.SQLITE
%TEMP%\CE4CF87733651BF1F44DD1E02FC1A8E8
%PROFILE%\PRIVACIE\INDEX.DAT
%WinDir%\TASKS\USER_FEED_SYNCHRONIZATION-{600E3BA8-8EF5-4554-94FE-DB90950D3DEB}.JOB

FOLDERS ADDED:2

%COMMON APPDATA%\SENDORI
%PROGRAM FILES%\SENDORI

FOLDERS[ATTR]CHANGED:2

C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\HISTORY
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES

I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:

Download UnHackMe
Fully Functional 30-day Trial. No credit is required. Reviews. EULA. Privacy Policy.

Leave a Reply