View MDO database (ALL)
Showing entries 17626 to 17650 of 18323.
Go directly to page: 1 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 733
(O) uProxyOverride = 127.0.0.1:9421;<local> P2P from Bittorrent. http://mozillalinks.org/2007/03/bittorrent-support-for-firefox/ Windows ALL; discovered by Nasdaq |
(O) uProxyOverride = 127.0.0.1:9421; P2P from Bittorrent. http://mozillalinks.org/2007/03/bittorrent-support-for-firefox/ Windows ALL; discovered by nasdaq |
(Q) uProxyOverride = 127.0.0.1;*.local Check if required. Could be associated with a Rogue Fakealert infection. Windows ALL; discovered by Nasdaq |
(L) uProxyOverride = 127.0.0.1;localhost;*.local May have been set the an Administrator. http://blogs.technet.com/b/heyscriptingguy/archive/2005/05/19/how-can-i-switch-between-using-a-proxy-server-and-not-using-a-proxy-server.aspx Windows ALL; discovered by Nasdaq |
(O) uProxyOverride = cdn;*.local;127.0.0.1:9421;<local> P2P from Bittorrent. http://mozillalinks.org/2007/03/bittorrent-support-for-firefox/ Windows ALL; discovered by Nasdaq |
(O) uProxyOverride = localhost; 127.0.0.1; <local> May have been set the an Administrator. http://blogs.technet.com/b/heyscriptingguy/archive/2005/05/19/how-can-i-switch-between-using-a-proxy-server-and-not-using-a-proxy-server.aspx Windows ALL; discovered by nasdaq |
(Q) uProxyOverride = localhost; 127.0.0.1; <local>;*.local May have been set by an IT Administrator. http://blogs.technet.com/b/heyscriptingguy/archive/2005/05/19/how-can-i-switch-between-using-a-proxy-server-and-not-using-a-proxy-server.aspx Windows ALL; discovered by Nasdaq |
(O) uProxyOverride = localhost;127.0.0.1;127.0.0.1:9421; P2P from Bittorrent. http://mozillalinks.org/2007/03/bittorrent-support-for-firefox/ Windows ALL; discovered by nasdaq |
(Q) uProxyServer = hxxp=127.0.0.1:50121 Make sure this was set and required by the owner. Windows ALL; discovered by Nasdaq |
(X) uProxyServer = hxxp=127.0.0.1:6092 Generic.dx!tqj!8F28D11D0FA6 TROJAN! Fix / Info: Reset Proxy http://vil.nai.com/vil/content/v_272025.htm Windows ALL; discovered by Nasdaq |
(Q) uProxyServer = socks=127.0.0.1:4021 May have been set by an IT Administrator. Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - FCToolbarURLSearchHook Class - {ada2ac0d-15c6-4611-ba5d-5b0a8b52fd6d} - C:\Program Files (x86)\Nectar Search Toolbar\Helper.dll () Adware http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=ada2ac0d-15c6-4611-ba5d-5b0a8b52fd6d Windows ALL; discovered by Nasdaq |
(L) URLSearchHook: HKCU - KeywordSpySEO Helper - {5F9575C2-1AB4-4883-8505-5C6D0DFDF2D5} - C:\Program Files\KeywordSpy SEOPPC Plug-in\KeywordSpySEO.dll () KeywordSpy http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=5F9575C2-1AB4-4883-8505-5C6D0DFDF2D5 Windows ALL; discovered by Nasdaq |
(L) URLSearchHook: HKCU - McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - C:\Program Files (x86)\McAfee\SiteAdvisor\x64\McIEPlg.dll (McAfee, Inc.) McAfee SiteAdvisor http://www.systemlookup.com/CLSID/34572-mcieplg_dll.html Windows ALL; discovered by Nasdaq |
(L) URLSearchHook: HKCU - PC Tools Browser Guard - {472734EA-242A-422b-ADF8-83D1E48CC825} - C:\Program Files\PC Tools Security\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.) PCTools Browser Defender Toolbar http://www.systemlookup.com/CLSID/65860-PCTBrowserDefender_dll.html Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - RuneScape Toolbar - {a8864317-e18b-4292-99d9-e6e65ab905d3} - C:\Program Files (x86)\RuneScape\prxtbRune.dll (Conduit Ltd.) PUP.Optional.Conduit http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=a8864317-e18b-4292-99d9-e6e65ab905d3 Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - Search Results Toolbar - {fa63398e-322b-4833-9af3-15837ad12138} - C:\Program Files (x86)\searchresults\searchresultsDx.dll No File Win32/Toolbar.Visicom (variant) http://www.herdprotect.com/searchresultsdx.dll-433625d72f467c9a5bd10c36577a3cde4f4e97ae.aspx Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - SearchHook Class - {D8278076-BC68-4484-9233-6E7F1628B56C} - C:\Program Files (x86)\AskPartnerNetwork\Toolbar\searchhook.dll (APN LLC.) Adware http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=D8278076-BC68-4484-9233-6E7F1628B56C Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - ToolbarURLSearchHook Class - {CA3EB689-8F09-4026-AA10-B9534C691CE0} - C:\Program Files (x86)\ChatZum Toolbar\tbunsp4B65.tmp\tbhelper.dll () a Softomate/Besttoolbars Toolbar http://www.systemlookup.com/CLSID/76221-tbhelper_dll.html Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - Vuze Remote Toolbar - {05478A66-EDB6-4A22-A870-A5987F80A7DA} - C:\Program Files (x86)\Vuze Remote Toolbar\IE\9.6\vuzeToolbarIE64.dll (Spigot, Inc.) PUP.Optional.Conduit http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=ba14329e-9550-4989-b3f2-9732e92d17cc Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKCU - YTNavAssistPlugin Class - {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - C:\Program Files (x86)\Yahoo!\Companion\Installs\cpn3\yt.dll (Yahoo! Inc.) PUP - comes bundled with many third party applications http://www.systemlookup.com/CLSID/72886-YTNavAssist_dll_yt_dll.html Windows ALL; discovered by Nasdaq |
(L) URLSearchHook: HKLM - SimilarWeb - {74198672-5F7D-4FE9-A611-4AC1D5A66A15} - C:\Program Files\SimilarWeb\SimilarWeb.dll (SimilarGroup) SimilarWeb browser plugin for IE http://www.systemlookup.com/CLSID/77046-SimilarWeb_dll.html Windows ALL; discovered by Nasdaq |
(U) URLSearchHook: HKLM-x32 - AOL Messaging Toolbar Search Class - {03402f96-3dc7-4285-bc50-9e81fefafe43} - C:\Program Files (x86)\AIM Toolbar\aimtb.dll (AOL Inc.) AIM Toolbar, changes default search settings http://www.systemlookup.com/search.php?type=filename&client=malwaresearch-chrome&search=aimtb.dll Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKLM-x32 - Ashampoo PO Toolbar - {d43723ae-1ae1-4a25-a6a4-bf0929273cab} - C:\Program Files (x86)\Ashampoo_PO\prxtbAsha.dll (Conduit Ltd.) PUP.Optional.Conduit http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=d43723ae-1ae1-4a25-a6a4-bf0929273cab Windows ALL; discovered by Nasdaq |
(X) URLSearchHook: HKLM-x32 - Connect DLCS Toolbar - {aad50c91-b136-49d9-8b30-0e8d3ead63d0} - C:\Program Files (x86)\Connect_DLCS\prxtbConn.dll (Conduit Ltd.) PUP.Optional.Conduit http://www.systemlookup.com/search.php?type=clsid&client=malwaresearch-chrome&search=aad50c91-b136-49d9-8b30-0e8d3ead63d0 Windows ALL; discovered by Nasdaq |
This is a list of items that is designed to help with the analysis of HijackThis, DDS, OTL and FRST logs.
It is by no means exhaustive (in fact it is being added to all the time), and is intended
to complement other legitimate online lists.