sendorisetupx10402.exe

Sendori

Sendori, Inc

This is part of the Sendori web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application sendorisetupx10402.exe by Sendori, Inc has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
Sendori, Inc.  (signed by Sendori, Inc)

Product:
Sendori

Version:
1.1.6.0

MD5:
eadc772d656411b086e31fe4f2a77fa5

SHA-1:
a6ab2f3b4f5f2914243b7da66cdfdf1f45e8334d

SHA-256:
a2f9859c9148eea512db5097b1afc1162b2f5581e51b709563194c1372ff35eb

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/19/2024 10:28:43 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Installer.Sendori.S
14.8.7.21

File size:
680.1 KB (696,392 bytes)

Copyright:
© Sendori, Inc. All rights reserved.

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\opencandy\1969325da6134e12a883c67a06a90d28\sendorisetupx10402.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/4/2011 8:00:00 PM

Valid to:
4/4/2012 7:59:59 PM

Subject:
CN="Sendori, Inc", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Sendori, Inc", L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6A8CD259E21F05F060D52547EE219B9B

File PE Metadata
Compilation timestamp:
12/5/2009 5:53:24 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:4OEqT2YpeRTv+pRe3kD2Y8TaUuiF25Z9S3RsNFWzXSsNY:9lT2AexvWenZnFI9SWNUNY

Entry address:
0x355E

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B8, A7, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 80, 40, 00, 53, FF, 15, 88, 82, 40, 00, 6A, 08, A3, 98, 10, 43, 00, E8, D6, 2E, 00, 00, A3, E4, 0F, 43, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, E8, A7, 42, 00, FF, 15, 58, 81, 40, 00, 68, AC, A7, 40, 00, 68, E0, 07, 43, 00, E8, DC, 29, 00, 00, FF, 15, AC, 80, 40, 00, BF, 00, 70, 43, 00, 50, 57, E8, CA, 29, 00, 00...
 
[+]

Entropy:
7.8589

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

Remove sendorisetupx10402.exe - Powered by Reason Core Security