⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 smb_suspicious_files.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
📖 第 1 页 / 共 5 页
字号:
ITEM=EXP=instafin.dllNAME=SearchCentrix adware variantURL=http://www.kephyr.com/spywarescanner/library/searchcentrix.mygeek/index.phtmlKEY=CLSID\{4E7BD74F-2B8D-469E-DFF7-EC6BF4D5FA7D}\InprocServer32ITEM=EXP=gsim.dllNAME=KeenValue/Powersearch variantURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-DFF7-EC7DA787AD2D}\InprocServer32ITEM=EXP=Pwrsqsim.dllNAME=404SearchURL=http://doxdesk.com/parasite/404Search.htmlKEY=CLSID\{4E7BD74F-2B8D-469E-EEFD-ED6DB186CE4D}\InprocServer32ITEM=EXP=404Search.dllNAME=IncrediFind/KeenvalueURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{4FC95EDD-4796-4966-9049-29649C80111D}\InprocServer32ITEM=EXP=incfindbho.dllNAME=SeekSeekURL=http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=ADW_SCANPORTAL.A&VSect=TKEY=CLSID\{5074851C-F67A-488E-A9C9-C244573F4068}\InprocServer32ITEM=EXP=iesearch.dllNAME=AdBarsURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453079049KEY=CLSID\{51641EF3-8A7A-4D84-8659-B0911E947CC8}\InprocServer32ITEM=EXP=DownloadHtml.dllNAME=WurldMediaURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=59272KEY=CLSID\{525BBD23-1863-46C6-86D6-5F9A3715D44E}\InprocServer32ITEM=EXP=mbho.dllNAME=NetNucleus/Mirar webbandURL=http://www.kephyr.com/spywarescanner/library/mirartoolbar.winnb40/index.phtmlKEY=CLSID\{528DA727-EC08-461E-9564-DF5C971E8574}\InprocServer32ITEM=EXP=WinNB40.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{52DC9EC1-35A9-4914-98D9-D568A9854DA2}\InprocServer32ITEM=EXP=dllNAME=DigitalNames spyware relatedURL=http://securityresponse.symantec.com/avcenter/venc/data/spyware.digitalnames.htmlKEY=CLSID\{531553EB-B210-4116-BC2C-C09608F4193E}\InprocServer32ITEM=EXP=SetGlbHO.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{5321E378-FFAD-4999-8C62-03CA8155F0B3}\InprocServer32ITEM=EXP=1.00.07.dllNAME=404SearchURL=http://doxdesk.com/parasite/404Search.htmlKEY=CLSID\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}\InprocServer32ITEM=EXP=404Search.dllNAME=WinAdURL=http://www.kephyr.com/spywarescanner/library/winad/index.phtmlKEY=CLSID\{53D3C442-8FEE-4784-9A21-6297D39613F0}\InprocServer32ITEM=EXP=Winad2.dllNAME=HighTrafficURL=http://www.doxdesk.com/parasite/HighTraffic.htmlKEY=CLSID\{53E10C2C-43B2-4657-BA29-AAE179E7D35C}\InprocServer32ITEM=EXP=BHO2.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{5483427F-93B8-1470-5A89-E6B56484CDB2}\InprocServer32ITEM=EXP=NAME=InetSpeak/IexplorrURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{54ED9B49-81D1-4866-95A6-30F01DE0047E}\InprocServer32ITEM=EXP=iexplorr29.dllNAME=from imu.com.cnURL=KEY=CLSID\{54F8C0E2-34F9-474F-B47F-2CFCFE2300A2}\InprocServer32ITEM=EXP=IMULiver.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{55E301E5-BA44-4095-BB0B-14E0123CCF71}\InprocServer32ITEM=EXP=datNAME=SafeguardProtect/VeevoURL=http://www.castlecops.com/tk1602-sfg_dll_random_char.htmlKEY=CLSID\{564FFB73-9EEF-4969-92FA-5FC4A92E2C2A}\InprocServer32ITEM=EXP=sfg_NAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\InprocServer32ITEM=EXP=setfgi.dllNAME=Adware.Margoc variantURL=http://sarc.com/avcenter/venc/data/adware.margoc.htmlKEY=CLSID\{57CD6D2E-0291-488F-B846-AF101B367DD5}\InprocServer32ITEM=EXP=dllNAME=Ezula TopTextURL=http://www.cexx.org/toptext.htmKEY=CLSID\{58359010-BF36-11D3-99A2-0050DA2EE1BE}\InprocServer32ITEM=EXP=eabh.dllNAME=GratiswareURL=http://www.doxdesk.com/parasite/Gratisware.htmlKEY=CLSID\{5843A29E-1246-11D4-BA8C-0050DA707ACD}\InprocServer32ITEM=EXP=crs32.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{587DBF2D-9145-4c9e-92C2-1F953DA73773}\InprocServer32ITEM=EXP=Iefeatsl.dllNAME=TotalVelocity zSearchURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453083031KEY=CLSID\{5886A6DC-AAF4-45E9-979A-8E5E6DEE30E7}\InprocServer32ITEM=EXP=zSearch.dllNAME=JimmySurfURL=http://www.safer-networking.com/removeJimmySurf.phpKEY=CLSID\{5998B08E-CFAC-11D5-822A-0050048E6E38}\InprocServer32ITEM=EXP=SurfPlugin.dllNAME=WurldMediaURL=http://www.doxdesk.com/parasite/WurldMedia.htmlKEY=CLSID\{5A3A5040-4210-11D7-BD2E-00080E34122F}\InprocServer32ITEM=EXP=M030206POHS.DLLNAME=iSearch Desktop Search toolbarURL=KEY=CLSID\{5B4AB8E2-6DC5-477A-B637-BF3C1A2E5993}\InprocServer32ITEM=EXP=sysupd.dllNAME=eSearch browser HijackerURL=http://www.vsantivirus.com/troj-startpage-lg.htmKEY=CLSID\{5C472352-90D0-4214-BF20-8E4A2B82F980}\InprocServer32ITEM=EXP=win32app.dllNAME=IncrediFind/KeenvalueURL=http://www.doxdesk.com/parasite/KeenValue.htmlKEY=CLSID\{5D60FF48-95BE-4956-B4C6-6BB168A70310}\InprocServer32ITEM=EXP=incfindbho.dllNAME=180solutionsURL=http://www.surfassistant.com/eula.htmlKEY=CLSID\{5DAFD089-24B1-4c5e-BD42-8CA72550717B}\InprocServer32ITEM=EXP=saiemod.dllNAME=ClientManURL=http://www.doxdesk.com/parasite/ClientMan.htmlKEY=CLSID\{5ED50735-B0D9-47C6-9774-02DD8E6FE053}\InprocServer32ITEM=EXP=disable.dllNAME=BrowserAid CashToolbar/QuickLaunch toolbarURL=http://www.doxdesk.com/parasite/BrowserAid.htmlKEY=CLSID\{5F5564AC-DE7A-4DCD-9296-32E71A35DCB6}\InprocServer32ITEM=EXP=Browseraidtoolbar.dllNAME=BrowserPal toolbarURL=http://www.doxdesk.com/parasite/BrowserPal.htmlKEY=CLSID\{5F5564AC-DE7A-4DCD-9296-32E71A35DCB7}\InprocServer32ITEM=EXP=bptlb.dllNAME=Adlogix.com Zamingo adwareURL=http://www.spyany.com/program/article_adw_rm_Zamingo.htmlKEY=CLSID\{5FA6752A-C4A0-4222-88C2-928AE5AB4966}\InprocServer32ITEM=EXP=SWin32.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{60112085-E1CE-4e0e-823A-EBB1AD98804C}\InprocServer32ITEM=EXP=datNAME=Naupoint toolbarURL=http://doxdesk.com/parasite/Naupoint.htmlKEY=CLSID\{60261C06-81B0-4DE0-9313-E5BA203A64E9}\InprocServer32ITEM=EXP=pdfmgr.dllNAME=NetpalURL=http://www.doxdesk.com/parasite/NetPal.htmlKEY=CLSID\{6085FB5B-C281-4B9C-8E5D-D2792EA30D2F}\InprocServer32ITEM=EXP=Netpal.dllNAME=iGetNet/Natural Language NavigationURL=http://www.doxdesk.com/parasite/IGetNet.htmlKEY=CLSID\{60E78CAC-E9A7-4302-B9EE-8582EDE22FBF}\InprocServer32ITEM=EXP=BHO001.DLLNAME=i-lookup search barURL=http://www.doxdesk.com/parasite/ILookup.htmlKEY=CLSID\{61D029AC-972B-49FE-A155-962DFA0A37BB}\InprocServer32ITEM=EXP=Ineb.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{62160EEF-9D84-4C19-B7B8-6AC2526CD726}\InprocServer32ITEM=EXP=dllNAME=Matrix Technology Network 123ManiaURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453094812KEY=CLSID\{622CC208-B014-4FE0-801B-874A5E5E403A}\InprocServer32ITEM=EXP=GIDCAI32.DLLNAME=CnsMinURL=http://www.doxdesk.com/parasite/CnsMin.htmlKEY=CLSID\{6231D512-E4A4-4DF2-BE62-5B8F0EE348EF}\InprocServer32ITEM=EXP=cesweb.dllNAME=Stingware GuardBarURL=http://www.guardbar.com/KEY=CLSID\{62F5BBB6-A71E-46E7-AE78-73D25185EDC8}\InprocServer32ITEM=EXP=GuardBar.dllNAME=Townews.com adwareURL=KEY=CLSID\{634EFDE4-087D-4ce9-952F-63C9EEB2E0BF}\InprocServer32ITEM=EXP=WNDPOS~1.DLLNAME=Naupoint toolbarURL=http://doxdesk.com/parasite/Naupoint.htmlKEY=CLSID\{6375B3AD-4440-4C1F-95E5-A24198ED671C}\InprocServer32ITEM=EXP=sp1.dllNAME=HuntbarURL=http://www.doxdesk.com/parasite/HuntBar.htmlKEY=CLSID\{63B78BC1-A711-4D46-AD2F-C581AC420D41}\InprocServer32ITEM=EXP=Btiein.dllNAME=FlashTrack, FtappURL=http://www.doxdesk.com/parasite/FlashTrack.htmlKEY=CLSID\{63CF97E8-4133-438a-A831-CC9C6D47D673}\InprocServer32ITEM=EXP=Flcp.dllNAME=Win32/Aspam.TrojanURL=http://www.doxdesk.com/parasite/ASpam.htmlKEY=CLSID\{657B9354-BB3B-4500-A9B0-109B4FA64815}\InprocServer32ITEM=EXP=amcis32.dllNAME=Commander ToolbarURL=KEY=CLSID\{6596829B-37D4-40ad-971B-1E9041725C52}\InprocServer32ITEM=EXP=ietb.dllNAME=PeopleOnPage/AproposMediaURL=http://www.doxdesk.com/parasite/AproposMedia.htmlKEY=CLSID\{65C8C1F5-230E-4DC9-9A0D-F3159A5E7778}\InprocServer32ITEM=EXP=popNAME=OpinionBarURL=http://www.earncashontheinternet.com/paidtosurf/review/opinionbar.aspKEY=CLSID\{6607C683-AE7C-11D4-ACD7-0050DAC291A2}\InprocServer32ITEM=EXP=Myiemonitor.dllNAME=Commonname toolbarURL=http://www.doxdesk.com/parasite/CommonName.htmlKEY=CLSID\{6656B666-992F-4D74-8588-8CAC9E79D90C}\InprocServer32ITEM=EXP=CNBabe.dllNAME=FlashTrack, FtappURL=http://www.doxdesk.com/parasite/FlashTrack.htmlKEY=CLSID\{665ACD90-4541-4836-9FE4-062386BB8F05}\InprocServer32ITEM=EXP=FNAME=LinkReplacerURL=http://www.doxdesk.com/parasite/LinkReplacer.htmlKEY=CLSID\{66993893-61B8-47DC-B10D-21E0C86DD9C8}\InprocServer32ITEM=EXP=iehelper.dllNAME=WhazitURL=http://www.doxdesk.com/parasite/Whazit.htmlKEY=CLSID\{66F67511-2665-4C34-9E20-FAC2C0954EF2}\InprocServer32ITEM=EXP=whattt.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{68132581-10F2-416E-B188-4E648075325A}\InprocServer32ITEM=EXP=datNAME=PrecisionPop adwareURL=http://sarc.com/avcenter/venc/data/adware.precisionpop.htmlKEY=CLSID\{68513770-A18E-11D7-B77C-00C0DFF3F600}\InprocServer32ITEM=EXP=Helper.dllNAME=IEpluginURL=http://www.doxdesk.com/parasite/IEPlugin.htmlKEY=CLSID\{69135BDE-5FDC-4B61-98AA-82AD2091BCCC}\InprocServer32ITEM=EXP=systb.dllNAME=VirtuMonde adware variantURL=http://securityresponse.symantec.com/avcenter/venc/data/adware.virtumonde.htmlKEY=CLSID\{6A06CDAD-9D2D-42A0-9C91-C0CF7CB9971B}\InprocServer32ITEM=EXP=datNAME=LinkReplacer hijacker variantURL=http://www.doxdesk.com/parasite/LinkReplacer.htmlKEY=CLSID\{6A6E50DC-BFA8-4B40-AB1B-159E03E829FD}\InprocServer32ITEM=EXP=lmf32.dllNAME=eAcceleration StopSignURL=http://www.doxdesk.com/parasite/DownloadReceiver.htmlKEY=CLSID\{6ACD11BD-4CA0-4283-A8D8-872B9BA289B6}\InprocServer32ITEM=EXP=webcbrowse.dllNAME=Alexa ToolbarURL=http://pages.alexa.com/prod_serv/quicktour_new.htmlKEY=CLSID\{6AF9BC61-3CC5-42A7-82D1-FFC2562A7289}\InprocServer32ITEM=EXP=Alxie328.dllNAME=InetSpeak/IexplorrURL=http://www.doxdesk.com/parasite/InetSpeak.htmlKEY=CLSID\{6B12DABB-0B7C-44FA-B0B3-4BAFF3790256}\InprocServer32ITEM=EXP=Iexplorr24.dllNAME=Winshow/Searchv.com hijackerURL=http://www.doxdesk.com/parasite/Winshow.htmlKEY=CLSID\{6CC1C918-AE8B-4373-A5B4-28BA1851E39A}\InprocServer32ITEM=EXP=winshow.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{6CC1C91A-AE8B-4373-A5B4-28BA1851E39A}\InprocServer32ITEM=EXP=winlink.dllNAME=SafeguardProtect/VeevoURL=http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453082734KEY=CLSID\{6CDF3C49-20E6-48d7-811B-9F5DD17F1D90}\InprocServer32ITEM=EXP=sfg****.dllNAME=Comet CursorURL=http://www.castlecops.com/tk364-brbho_dll.htmlKEY=CLSID\{6D0AC7F7-B628-4581-A8B2-14D97F24AA76}\InprocServer32ITEM=EXP=brbho.dllNAME=BrowserAid/ABCSearchURL=http://www.doxdesk.com/parasite/CashToolbar.htmlKEY=CLSID\{6D55490C-1BD4-4790-BA31-84D261316E28}\InprocServer32ITEM=EXP=Highlighthelper.dllNAME=suspected keyword hijackerURL=http://computercops.biz/postlite89308-.htmlKEY=CLSID\{6D9F42B8-B7E5-4BB9-9A13-CAE53D44196E}\InprocServer32ITEM=EXP=searcher.dllNAME=SafeguardProtect/VeevoURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453082734KEY=CLSID\{6E1C5E3D-A8E6-4a92-820F-BFCFE45BA158}\InprocServer32ITEM=EXP=veevNAME=SafeguardProtect/VeevoURL=http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453082734KEY=CLSID\{6E34D984-4054-45E3-8452-0159A2F0D232}\InprocServer32ITEM=EXP=Veevo.dllNAME=FriendGreetings E-Card foistwareURL=http://vil.nai.com/vil/content/v_99760.htmKEY=CLSID\{7011471D-3F74-498E-88E1-C0491200312D}\InprocServer32ITEM=EXP=Otglove.dllNAME=Xupiter OrbitexplorerURL=http://www.doxdesk.com/parasite/Xupiter.htmlKEY=CLSID\{702AD576-FDDB-4d0f-9811-A43252064684}\InprocServer32ITEM=EXP=Toolbar.dllNAME=TV Media/CleverIEHookerURL=http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453077508KEY=CLSID\{707E6F76-9FFB-4920-A976-EA101271BC25}\InprocServer32ITEM=EXP=Jeired.dllNAME=HDTbarURL=http://www.spynet.com/spyware/spyware-HDTBar.aspxKEY=CLSID\{70B3DA2C-E02D-4ce0-B1F8-48320FD443D2}\InprocServer32ITEM=EXP=T2BHO.dllNAME=CoolWebSearch parasite variantURL=http://www.richardthelionhearted.com/~merijn/cwschronicles.html#KEY=CLSID\{710089CF-87C3-763F-C8F6-5A0DBFD3AEC3}\InprocServer32ITEM=EXP=Multiple file namesNAME=321search.com search hijackerURL=KEY=CLSID\{7148369a-1105-4e85-83e0-085e784ba374}\InprocServer32ITEM=EXP=SearchAssistant.dllNAME=Blazefind IESearchbarURL=http://www.kephyr.com/spywarescanner/library/iesearchbar/index.phtmlKEY=CLSID\{71ED4FBA-4024-4bbe-91DC-9704C93F453E}\InprocServer32ITEM=EXP=Iesearchbar.dllNAME=NeoToolbarURL=http://doxdesk.com/parasite/NeoToolbar.htmlKEY=CLSID\{722E8B26-1C44-460F-88BB-50C82B20E30E}\InprocServer32ITEM=EXP=msqsb.dllNAME=LoveTester foistwareURL=http://spamwatch.codefish.net.au/modules.php?op=modload&name=News&file=index&catid=&topic=24KEY=CLSID\{72557F9F-13AE-44C9-B3D7-5091B599027C}\InprocServer32ITEM=EXP=smail11.dllNAME=ZeroPopupBarURL=http://www.doxdesk.com/parasite/ZeroPopUp.htmlKEY=CLSID\{

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -