View MDO database (ALL)
Showing entries 18176 to 18200 of 18323.
Go directly to page: 1 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733
(U) uStart Page = hxxp://www.xunlei.com DDS reported item. Windows ALL; discovered by nasdaq |
(L) uStart Page = hxxp://www.yahoo.co.jp/ set by user Windows ALL; discovered by nasdaq |
(U) uStart Page = hxxp://www.ynet.co.i/ DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = hxxp://www.zoomtown.com/ DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = hxxp://yahoo.com Set by user Windows ALL; discovered by Nasdaq |
(U) uStart Page = hxxp://yahoo.com.au/ Set by user Windows ALL; discovered by Nasdaq |
(U) uStart Page = hxxp://yahoo.com.hk/ Set by user. Windows ALL; discovered by nasdaq |
(U) uStart Page = hxxp://yahoo7.com.au/ Set by user Windows ALL; discovered by Nasdaq |
(U) uStart Page = hxxps://outlook.com/microsoft.com Set by user Windows ALL; discovered by Nasdaq |
(U) uStart Page = news.ninemsn.com.au/ set by user Windows ALL; discovered by nasdaq |
(U) uStart Page = www.aliant.net DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = www.bing.com Set by user Windows ALL; discovered by Nasdaq |
(U) uStart Page = www.msnbc.com DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = www.talktalk.co.uk DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = www.telegraph.co.uk DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = www.toshibadirect.com/dpdstart DDS reported item. Windows ALL; discovered by nasdaq |
(U) uStart Page = www.yahoo.com Set by user Windows ALL; discovered by Nasdaq |
(X) uURLSearchHooks: N/A: {f4c28532-b9d0-4950-a2df-e83f9929242b} - C:\Program Files (x86)\MyFunCards_5m\bar\1.bin\5mSrcAs.dll MyFunCards toolbar, powered by MyWebSearch - detected as a MyWebSearch adware variant, or as "Adware.Funweb" http://www.systemlookup.com/CLSID/73463-3wbar_dll.html Windows ALL; discovered by nasdaq |
(U) uWindow Title = Microsoft Internet Explorer Set by user Windows ALL; discovered by Nasdaq |
(U) uWindow Title = Windows Internet Explorer provided by Microsoft set by user Windows ALL; discovered by nasdaq |
(X) uWindows: load=c:\windows\fonts\services.exe W32.Virut.CF http://www.threatexpert.com/report.aspx?md5=6a5d8ef8cfd6aba491d56e2d6fc19da1 Windows ALL; discovered by nasdaq |
(X) uWinlogon: Shell="c:\documents and settings\all users.windows\application data\security essentials 2011\SE2011.exe" /hide Win-Trojan/Infostealer.161280 http://www.threatexpert.com/report.aspx?md5=55ac03b62aca6a8210e9dfc0f5a33ee6 Windows ALL; discovered by nasdaq |
(X) uWinlogon: Shell=c:\documents and settings\bill\application data\hotfix.exe ThinkPoint Fake AV http://community.trendmicro.com/t5/Malware-Discussions/How-to-remove-ThinkPoint-Fake-AV/m-p/17692 Windows ALL; discovered by nasdaq |
(U) uWinlogon: Shell=explorer.exe, dds reported item Windows ALL; discovered by nasdaq |
(X) uWinlogon: Shell=explorer.exe,c:\documents and settings\owner\application data\microsoft\windows\shell.exe Troj/FakeDpr-A Fix / Info: HijackThis and Malwarebytes http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakedpra.html?_log_from=rss Windows ALL; discovered by nasdaq |
This is a list of items that is designed to help with the analysis of HijackThis, DDS, OTL and FRST logs.
It is by no means exhaustive (in fact it is being added to all the time), and is intended
to complement other legitimate online lists.