View all database entries

ALL  PP  F0  F1  F2  F3  R0  R1  N1  N2  N3  N4  O1  O2  O3  O4  O5  O6  O7  O8  
O9  O10  O11  O12  O13  O14  O15  O16  O17  O18  O19  O20  O21  O22  O23  CHR  FF  

View MDO database (ALL)

Showing entries 17976 to 18000 of 18322.

Go directly to page: 1  713  714  715  716  717  718  719  720  721  722  723  724  725  726  727  733

(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2790392
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2801948
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2818425
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2851643
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2866295
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2929271
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3001736
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3007394
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3072253
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3074349
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3176986
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT3184201
PUP.Optional.Conduit
http://www.systemlookup.com/CLSID/70651-ConduitEngin1_dll_ConduitEngine_dll.html
Windows ALL; discovered by nasdaq
(X) uStart Page = hxxp://search.coupons.com/
AdWare.Win32.Coupons
http://www.systemlookup.com/search.php?type=name&client=malwaresearch-chrome&search=coupons
Windows ALL; discovered by Nasdaq
(X) uStart Page = hxxp://search.hotspotshield.com/g/?c=h
BHO - detected by Symantec as "Trojan.Adclicker"
http://www.systemlookup.com/CLSID/56214.html
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.imesh.com/
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.localstrike.net/
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.myheritage.com
Set by user.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.notepad.com
dds reported item
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.orbitdownloader.com
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.shareazaweb.com/
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://search.student.utwente.nl/
set by user
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://seattle.craigslist.org/
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://securityresponse.symantec.com/avcenter/fix_homepage
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = hxxp://sg.yahoo.com/
Set by user.
Windows ALL; discovered by nasdaq

This is a list of items that is designed to help with the analysis of HijackThis, DDS, OTL and FRST logs.
It is by no means exhaustive (in fact it is being added to all the time), and is intended to complement other legitimate online lists.