View all database entries

ALL  PP  F0  F1  F2  F3  R0  R1  N1  N2  N3  N4  O1  O2  O3  O4  O5  O6  O7  O8  
O9  O10  O11  O12  O13  O14  O15  O16  O17  O18  O19  O20  O21  O22  O23  CHR  FF  

View MDO database (ALL)

Showing entries 18026 to 18050 of 18164.

Go directly to page: 1  713  714  715  716  717  718  719  720  721  722  723  724  725  726  727  

(U) uStart Page = news.ninemsn.com.au/
set by user
Windows ALL; discovered by nasdaq
(U) uStart Page = www.aliant.net
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = www.bing.com
Set by user
Windows ALL; discovered by Nasdaq
(U) uStart Page = www.msnbc.com
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = www.talktalk.co.uk
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = www.telegraph.co.uk
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = www.toshibadirect.com/dpdstart
DDS reported item.
Windows ALL; discovered by nasdaq
(U) uStart Page = www.yahoo.com
Set by user
Windows ALL; discovered by Nasdaq
(X) uURLSearchHooks: N/A: {f4c28532-b9d0-4950-a2df-e83f9929242b} - C:\Program Files (x86)\MyFunCards_5m\bar\1.bin\5mSrcAs.dll
MyFunCards toolbar, powered by MyWebSearch - detected as a MyWebSearch adware variant, or as "Adware.Funweb"
http://www.systemlookup.com/CLSID/73463-3wbar_dll.html
Windows ALL; discovered by nasdaq
(U) uWindow Title = Microsoft Internet Explorer
Set by user
Windows ALL; discovered by Nasdaq
(U) uWindow Title = Windows Internet Explorer provided by Microsoft
set by user
Windows ALL; discovered by nasdaq
(X) uWindows: load=c:\windows\fonts\services.exe
W32.Virut.CF
http://www.threatexpert.com/report.aspx?md5=6a5d8ef8cfd6aba491d56e2d6fc19da1
Windows ALL; discovered by nasdaq
(X) uWinlogon: Shell="c:\documents and settings\all users.windows\application data\security essentials 2011\SE2011.exe" /hide
Win-Trojan/Infostealer.161280
http://www.threatexpert.com/report.aspx?md5=55ac03b62aca6a8210e9dfc0f5a33ee6
Windows ALL; discovered by nasdaq
(X) uWinlogon: Shell=c:\documents and settings\bill\application data\hotfix.exe
ThinkPoint Fake AV
http://community.trendmicro.com/t5/Malware-Discussions/How-to-remove-ThinkPoint-Fake-AV/m-p/17692
Windows ALL; discovered by nasdaq
(U) uWinlogon: Shell=explorer.exe,
dds reported item
Windows ALL; discovered by nasdaq
(X) uWinlogon: Shell=explorer.exe,c:\documents and settings\owner\application data\microsoft\windows\shell.exe
Troj/FakeDpr-A
Fix / Info: HijackThis and Malwarebytes
http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakedpra.html?_log_from=rss
Windows ALL; discovered by nasdaq
(Q) uWinlogon: Userinit = C:\Windows\System32\userinit.exe
Check the file if having a problem at startup.
http://www.file.net/process/userinit.exe.html
Windows ALL; discovered by Nasdaq
(X) uWinlogon: Userinit=c:\windows\system32\vvgeowbv.exe,c:\windows\system32\userinit.exe
Trojan.Renos.DX
Fix / Info: Delete the file c:\windows\system32\vvgeowbv.exe
http://www.threatexpert.com/report.aspx?md5=518a50d91773290512116ef4bdfabcc7
Windows ALL; discovered by nasdaq
(L) Verknüpfungsziel in Adobe PDF konvertieren
Related to Adobe.
http://www.adobe.com/
Windows ALL; discovered by nasdaq
(L) Verknüpfungsziel in vorhandene PDF-Datei konvertieren
Related to Adobe.
http://www.adobe.com/
Windows ALL; discovered by nasdaq
(U) VIV Extension: (Bypass Paywall) - C:\Users\User\AppData\Local\Vivaldi\User Data\Default\Extensions\kkofljmpfaanangehehmbkkmbgjjlgja
Many websites have paywalls that prevent you from accessing the content. What this extension does is that shows you the cached version of the website without the paywall.
https://addonshub.com/extensions/bypass-paywall/kkofljmpfaanangehehmbkkmbgjjlgja?reviewpage=3
Windows ALL; discovered by Nasdaq
(U) VIV Extension: (Cool Red Skull) - C:\Users\User\AppData\Local\Vivaldi\User Data\Default\Extensions\fbnadkhoaidpibebkfcobnljcopeklml
A Theme
https://chrome.google.com/webstore/detail/cool-red-skull/fbnadkhoaidpibebkfcobnljcopeklml
Windows ALL; discovered by Nasdaq
(U) VIV Extension: (Deep Dark) - C:\Users\User\AppData\Local\Vivaldi\User Data\Default\Extensions\eeffcpnmcmfdfnaadpnkldhkcjjiihcf
A Theme
https://chrome.google.com/webstore/detail/deep-dark/eeffcpnmcmfdfnaadpnkldhkcjjiihcf?hl=en
Windows ALL; discovered by Nasdaq
(U) VIV Extension: (Downloads Pro) - C:\Users\User\AppData\Local\Vivaldi\User Data\Default\Extensions\lhhocifdmhogpekeppdjamkelohahbop
A clean and modern download manager for professionals.
https://chrome.google.com/webstore/detail/downloads-pro/lhhocifdmhogpekeppdjamkelohahbop?hl=en
Windows ALL; discovered by Nasdaq
(U) VIV Extension: (Font changer pro) - C:\Users\User\AppData\Local\Vivaldi\User Data\Default\Extensions\bfdlfijnkpenblkecgdgpfaamekddmdi
Font Changer Pro is a tool that manages font settings.
https://chrome.google.com/webstore/detail/font-changer-pro/bfdlfijnkpenblkecgdgpfaamekddmdi?hl=en
Windows ALL; discovered by Nasdaq

This is a list of items that is designed to help with the analysis of HijackThis, DDS, OTL and FRST logs.
It is by no means exhaustive (in fact it is being added to all the time), and is intended to complement other legitimate online lists.