📄 smb_suspicious_files.nasl
字号:
EXP=ngpw34.dllNAME=GoGoData toolbarURL=http://gogodata.com/toolbar/index.htmKEY=CLSID\{2D877C0B-3F44-42CD-A283-57AAA9186CB9}\InprocServer32ITEM=EXP=GoGoDataBar.dllNAME=VX2.aBetterInternet variantURL=KEY=CLSID\{2DC9D850-144D-11E1-B3C9-10805E499D95}\InprocServer32ITEM=EXP=mplay32.dllNAME=InetSpeakURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{2E12B523-3D4C-4FAC-9B04-0376A8F5E879}\InprocServer32ITEM=EXP=WindowsIE.dllNAME=FastFind adware variantURL=http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_STARTPAG.KF&VSect=TKEY=CLSID\{2E65A557-173C-4DE9-860B-28FC5CACA542}\InprocServer32ITEM=EXP=Setup.dllNAME=P0rn relatedURL=KEY=CLSID\{2E77E33F-671E-4334-ABAA-0C2E2BE654F1}\InprocServer32ITEM=EXP=mdv_32.dllNAME=SubmitHookURL=http://www.lurhq.com/submithook.htmlKEY=CLSID\{2E9CAFF6-30C7-4208-8807-E79D4EC6F806}\InprocServer32ITEM=EXP=Submithook.dllNAME=ezSearchingURL=http://doxdesk.com/parasite/ezSearching.htmlKEY=CLSID\{2F24B54D-3A27-11D8-8169-00C02623048A}\InprocServer32ITEM=EXP=Testadit3.dllNAME=Porn HijackerURL=KEY=CLSID\{2FF5573C-0EB5-43db-A1B2-C4326813468E}\InprocServer32ITEM=EXP=iehr.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{30192F8D-0958-44E6-B54D-331FD39AC959}\InprocServer32ITEM=EXP=toolband.dllNAME=SBSoft IWantSearch hijackerURL=http://sarc.com/avcenter/venc/data/adware.iwantsearch.htmlKEY=CLSID\{30192F8D-0958-44E6-B54D-331FD39AC959}\InprocServer32ITEM=EXP=rundlg32.dllNAME=SBSoft Web-Search hijacker variant, a member of the CoolWebSearch parasite familyURL=http://sarc.com/avcenter/venc/data/adware.iwantsearch.htmlKEY=CLSID\{30192F8D-0958-44E6-B54D-331FD39AC959}\InprocServer32ITEM=EXP=webdlg32.dllNAME=EZtracks/Pickoftheweb toolbarURL=KEY=CLSID\{3023AF97-870E-476A-B30E-3923DF2B84BD}\InprocServer32ITEM=EXP=eztracks_ieplug.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{30279F2D-1A38-4785-97D4-5C3508BDB289}\InprocServer32ITEM=EXP=datNAME=Adware.OpenSiteURL=http://sarc.com/avcenter/venc/data/adware.opensite.htmlKEY=CLSID\{30A56549-9D5B-4D34-AFA7-440A7F0538A9}\InprocServer32ITEM=EXP=Opnste.dllNAME=ProBot Activity MonitorURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453076611KEY=CLSID\{312FA154-E1B7-4336-9833-EE6B38D58B56}\InprocServer32ITEM=EXP=pbcommon.dllNAME=SubSearch v22URL=http://www.doxdesk.com/parasite/SubSearch.htmlKEY=CLSID\{31995C64-CB4D-483E-82C2-CCFFE2F66CAB}\InprocServer32ITEM=EXP=msvcn.dllNAME=ezSearchingURL=http://www.doxdesk.com/parasite/ezSearching.htmlKEY=CLSID\{34D516EA-40E3-4E3B-8BA8-505112738ED5}\InprocServer32ITEM=EXP=ctavp3.dllNAME=i-Lookup/ChgrgsURL=http://www.doxdesk.com/parasite/ILookup.htmlKEY=CLSID\{35CC7369-C6EB-4A64-AB05-44CF0B5087A0}\InprocServer32ITEM=EXP=Chgrgs.dllNAME=E2GiveURL=http://www.doxdesk.com/parasite/E2Give.htmlKEY=CLSID\{3643ABC2-21BF-46B9-B230-F247DB0C6FD6}\InprocServer32ITEM=EXP=IeBHOs.dllNAME=Burnaby Module >e-card_viewerURL=http://www.symantec.com/avcenter/venc/data/ortyc.trojan.htmlKEY=CLSID\{3750BFA3-1392-4AF3-AF86-9D2D4776E5A4}\InprocServer32ITEM=EXP=potd.dllNAME=Oasisnet.com Hijacker/web downloaderURL=KEY=CLSID\{37A5FF76-9919-492C-98E3-EDA3502FC829}\InprocServer32ITEM=EXP=Oasis.dllNAME=InetSpeak/IexplorrURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{388D7EBB-CBB9-4126-8DB2-86DC6863A206}\InprocServer32ITEM=EXP=iexplorr11.dllNAME=BookedSpaceURL=http://www.doxdesk.com/parasite/BookedSpace.htmlKEY=CLSID\{392BE62B-E7DE-430A-8859-0AFE677DE6E1}\InprocServer32ITEM=EXP=bs2.dllNAME=Hijacker, as yet unidentifiedURL=KEY=CLSID\{397D7D63-816E-4ECF-8761-775C932C5CF1}\InprocServer32ITEM=EXP=iDonate.dllNAME=InetSpeak/IexplorrURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{39AF31DD-EAFC-45EA-A56C-385B52E25CC0}\InprocServer32ITEM=EXP=iexplorr22.dllNAME=WurldMediaURL=http://www.doxdesk.com/parasite/WurldMedia.htmlKEY=CLSID\{3A279869-C6B6-4410-A041-0435DE6AD916}\InprocServer32ITEM=EXP=M030106SHOP.DLLNAME=Wishbone ToolbarURL=http://www.wishbonemedia.com/products.htmlKEY=CLSID\{3AA90BC2-58C0-4F4D-A87C-2C6F3D3CD5FE}\InprocServer32ITEM=EXP=Minst.dllNAME=LZIO.com adwareURL=http://www.spywareguide.com/product_show.php?id=853KEY=CLSID\{3BC2C2D1-758E-4912-BED2-AE50DE69E8AF}\InprocServer32ITEM=EXP=iedcb1f5.dllNAME=AlexaURL=http://www.safersite.com/PestInfo/a/Alexa_Toolbar.aspKEY=CLSID\{3DF73DF8-41E2-4fc2-8CBF-4B9407433755}\InprocServer32ITEM=EXP=lxTB.dllNAME=porn hijackerURL=KEY=CLSID\{3E307D7F-5F68-4ddb-9294-EE230950F60C}\InprocServer32ITEM=EXP=winacl.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{3EC8E271-FAB9-418a-8A8E-65AEB4029E64}\InprocServer32ITEM=EXP=datNAME=Traffix Inc/iMatchupURL=http://www.webhelper4u.com/transponders/potwbar.htmlKEY=CLSID\{3F68A524-6E47-44E6-9FE7-795EABFA3B36}\InprocServer32ITEM=EXP=traffix1.1.0.25.dllNAME=Not yet identified malwareURL=KEY=CLSID\{40205287-E793-41AC-B95C-D8D064BA33CA}\InprocServer32ITEM=EXP=mscfg.dllNAME=WurldMedia/bpbohURL=http://www.doxdesk.com/parasite/WurldMedia.htmlKEY=CLSID\{40AC4D2D-491D-11D4-AAF2-0008C75DCD2B}\InprocServer32ITEM=EXP=Bpboh.dllNAME=Popmonster adwareURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453078833KEY=CLSID\{4209B4C1-1295-4908-9312-A53C036EB3CD}\InprocServer32ITEM=EXP=BHO.dllNAME=PBarURL=http://www.pbar.net/?id=BAFDJFFBBEdDBEZKVCSKLKEY=CLSID\{42132494-F48F-4187-ABC8-0F343AD2E465}\InprocServer32ITEM=EXP=Pbshmd.dllNAME=Dyfuca/Internet OptimizerURL=http://www.doxdesk.com/parasite/InternetOptimizerKEY=CLSID\{432D8C41-8586-11D8-997D-00C026232EB9}\InprocServer32ITEM=EXP=bvm202.dllNAME=LoveTester foistwareURL=http://spamwatch.codefish.net.au/modules.php?op=modload&name=News&file=index&catid=&topic=24KEY=CLSID\{43FA5935-E36E-4937-8127-A90191B2EC68}\InprocServer32ITEM=EXP=domain11.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{441354C5-911B-409B-9A66-A11D6D4E1A22}\InprocServer32ITEM=EXP=sdmtb.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{446CF8A5-617E-4D91-95AE-AE78CE0D06AF}\InprocServer32ITEM=EXP=datNAME=ClientManURL=http://www.doxdesk.com/parasite/ClientMan.htmlKEY=CLSID\{447160CD-ECF5-4EA2-8A8A-1F70CA363F85}\InprocServer32ITEM=EXP=bundleNAME=Msinfosys/AutoSearch hijackerURL=http://www.doxdesk.com/parasite/AutoSearch.htmlKEY=CLSID\{44A23DAB-8D31-43AE-9F68-5AC24CF7CE8C}\InprocServer32ITEM=EXP=Msinfosys.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{44E5B409-35A2-4E8D-BF94-344222323A53}\InprocServer32ITEM=EXP=datNAME=Naupoint toolbarURL=http://doxdesk.com/parasite/Naupoint.htmlKEY=CLSID\{44FD0AF8-9D30-4E96-8ECE-306446B5E0D3}\InprocServer32ITEM=EXP=iEBINST2.dllNAME=Icoo LoaderURL=http://www.by-users.co.uk/forums/?board=help&action=display&num=1085918311KEY=CLSID\{465A59EC-20E5-4fca-A38A-E5EC3C480218}\InprocServer32ITEM=EXP=icoou.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E}\InprocServer32ITEM=EXP=dllNAME=W32.Aspam.Trojan.BURL=http://securityresponse.symantec.com/avcenter/venc/data/w32.aspam.trojan.b.htmlKEY=CLSID\{499DB658-1909-420B-931A-4A8CAEFD232F}\InprocServer32ITEM=EXP=Drvman32.dllNAME=NewDotNetURL=http://www.doxdesk.com/parasite/NewDotNet.htmlKEY=CLSID\{4A2AACF3-ADF6-11D5-98A9-00E018981B9E}\InprocServer32ITEM=EXP=newdotnetNAME=ezSearchingURL=http://www.doxdesk.com/parasite/ezSearching.htmlKEY=CLSID\{4B021269-DD24-48B2-96B4-DA121E9C0502}\InprocServer32ITEM=EXP=ctppNAME=StartNow/HyperBarURL=http://www.castlecops.com/tk266-HyperBHO.htmlKEY=CLSID\{4B2F5308-2CB0-40E2-8030-59936ED5D22C}\InprocServer32ITEM=EXP=Hyperbar.dllNAME=Adware.SaURL=http://sarc.com/avcenter/venc/data/adware.sa.htmlKEY=CLSID\{4BCF322B-9621-4e90-9678-F1424EB7584E}\InprocServer32ITEM=EXP=Udpmod.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\InprocServer32ITEM=EXP=ietlbass32.dllNAME=SubSearchURL=http://www.doxdesk.com/parasite/SubSearch.htmlKEY=CLSID\{4C4871FD-30F6-4430-8834-BC75D58F1529}\InprocServer32ITEM=EXP=Sbsrch_v2.dllNAME=InetSpeak/IexplorrURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{4CEBBC6B-5CEE-4644-80CF-38980BAE93F6}\InprocServer32ITEM=EXP=Iexplorr23.dllNAME=Begin2Search bar, iLookup variantURL=http://www.doxdesk.com/parasite/ILookup.htmlKEY=CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\InprocServer32ITEM=EXP=dllNAME=Trojan-Clicker.Win32.Delf.bcURL=KEY=CLSID\{4E7BD74F-2B8D-469E-85AC-FD60BB9AAE32}\InprocServer32ITEM=EXP=seotoolbar.dllNAME=2020SearchURL=http://www.kephyr.com/spywarescanner/library/2020search/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-92C6-CE7EB590A94D}\InprocServer32ITEM=EXP=2020Search2.dllNAME=Naupoint toolbarURL=http://doxdesk.com/parasite/Naupoint.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-95BE-B378BA9CB52D}\InprocServer32ITEM=EXP=Naupointbar.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.somatic/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-96F7-EB6DB99AA92E}\InprocServer32ITEM=EXP=gssomatic.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.somatic/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-98F7-EB6DB99AA93B}\InprocServer32ITEM=EXP=ifsomatic.dllNAME=Push toolbarURL=KEY=CLSID\{4E7BD74F-2B8D-469E-A0E8-F76FA694BF2E}\InprocServer32ITEM=EXP=searchv2.dllNAME=Hijacker, as yet unidentifiedURL=KEY=CLSID\{4E7BD74F-2B8D-469E-A1F6-FC7EB590A97D}\InprocServer32ITEM=EXP=search3.dllNAME=KeenValue/PowerSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-A3EE-FB7FA682AA7D}\InprocServer32ITEM=EXP=pwrsdp1.dllNAME=KeenValue/PowerSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-A3FA-F161A787AD2D}\InprocServer32ITEM=EXP=pwrsmnd1.dllNAME=Grip ToolbarURL=http://www.giantcompany.com/antispyware/research/spyware/spyware-Grip-Toolbar.aspxKEY=CLSID\{4E7BD74F-2B8D-469E-A4E4-FC7CBD87BD7D}\InprocServer32ITEM=EXP=gripcz6.dllNAME=PowerSearch toolbarURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-A58D-8F6FA787AD2D}\InprocServer32ITEM=EXP=PWRSC037.DLLNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.wzhelper/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FB-EF60B19DA02A}\InprocServer32ITEM=EXP=Wzhelper.dllNAME=SRNG/ShopNavURL=http://www.doxdesk.com/parasite/Srng.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FB-EF60B19DB42E}\InprocServer32ITEM=EXP=SNHelper.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.somatic/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FB-EF60B19DBC34}\InprocServer32ITEM=EXP=ifhelper.dllNAME=KeenValue/PowerSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FC-F378A787AD2D}\InprocServer32ITEM=EXP=Toolbarpwrstlbr.dllNAME=eUniverse SirSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FC-F76FA694BF2E}\InprocServer32ITEM=EXP=Searchbr.dllNAME=MegaSearchURL=http://doxdesk.com/parasite/MegaSearch.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FF-FA7FB592BF30}\InprocServer32ITEM=EXP=megasear.dllNAME=GamebarURL=http://member.game.net/Membership/Privacy.aspKEY=CLSID\{4E7BD74F-2B8D-469E-C0FF-FD69B994BD7D}\InprocServer32ITEM=EXP=gamebar.dllNAME=PickOfTheWeb toolbarURL=http://www.webhelper4u.com/transponders/potwbar.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FF-FD7BA09AAA7D}\InprocServer32ITEM=EXP=potwbar.dllNAME=eUniverse SearchNugget ToolbarURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C0FF-FD7FF4D5FA7D}\InprocServer32ITEM=EXP=sbar.dllNAME=KeenValue/PowerSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-C8FB-FC6DA787AD2D}\InprocServer32ITEM=EXP=pwrsacez.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.somatic/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-D1F7-EB6DB99AA97D}\InprocServer32ITEM=EXP=somatic.dllNAME=Voonda ToolbarURL=http://www.castlecops.com/tk1479-tafbar.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-D4FF-EB2CF4D5FA7D}\InprocServer32ITEM=EXP=taf.dllNAME=KeenValue/PowerSearchURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-D4FF-ED78A787AD2D}\InprocServer32ITEM=EXP=pwrstraf.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.webalize/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-D7E4-F660B597BF2A}\InprocServer32ITEM=EXP=Webalize.dllNAME=BrowserVillage ToolbarURL=http://www.giantcompany.com/antispyware/research/spyware/spyware-BrowserVillage-Toolbar.aspxKEY=CLSID\{4E7BD74F-2B8D-469E-D7F9-FE60B89CAC3F}\InprocServer32ITEM=EXP=bvillage.dllNAME=SearchCentrix variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.mygeek/index.phtml KEY=CLSID\{4E7BD74F-2B8D-469E-D9FB-FA6BAD98FA7D}\InprocServer32ITEM=EXP=MyGeek.dll - MyGeek/Search-o-Matic2000NAME=InstaFinder hijackerURL=KEY=CLSID\{4E7BD74F-2B8D-469E-DCF7-F96DA086B434}\InprocServer32
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -