Dziwne klucze

Czy to sa normalne klucze : Root : HKEY_USERS

Klucz : .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\seehardcore.com

Wpis : { KLUCZ }

WartoϾ : { KLUCZ }

Zmodyfikowano : [BRAK DANYCH]

Root : HKEY_USERS

Klucz : .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\nativehardcore.com

Wpis : { KLUCZ }

WartoϾ : { KLUCZ }

Zmodyfikowano : [BRAK DANYCH]

Witam,

zerknij TUTAJ, może to troche naświetli sytuację.

Ten skan jest zrobiony JV 16 Pover Toolsem, nie mam Spyware Blaster a Pest przed chwila nic nie wykryl. Mnie jednak ten wpis wydaje sie podejrzany

Witam ponownie,

jak najbardziej rozumiem i się nie dziwię, jednak znalazłem TUTAJ coś takiego (nieco za połową strony), co może sugerować, iż również w tej gałęzi można dodawac takie blokujące wpisy (wartość DWORD 4):

The danger WEB


Hi,


Here's a batch file that would block up the dangerous

websites that would like to ruin/spoil your Win98 computer.


It work like this:


First I'm exporting the following two registry keys:


  1.) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\

Internet Settings\ZoneMap

  2.) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\

Internet Settings\Zones


both the keys is stored in a file named "%temp%.\$s.reg". A file named

"%temp%.\$spy.reg" is then created like this:


The file "%temp%.\$spy.reg" contents the websites along with a dword =

00000004, and that information goes to the first key "KEY(1.)\Domains\

website". (There is 21 such items).


The second key: "KEY(2.)\4" is then affected by new dwords 1001...1E05

along with "CurrentLevel"=dword:00012000.


I don't know if the second key above is the same with another computer

without a danish Win98, IE 6.0 but I toke the dwords that was modified

after I was setting the classified zone to the highest security level?

If you don't like that, then delete all lines prefixed uppercase ECHO.


Benny Pedersen, http://2dos.homepage.dk/

PS. 83 lines, 4096 bytes,


@echo off% DangerWEB.BAT to BlockUp%

set cmdline= If U ready to move the file %temp%.\$s.reg to a safe place, % %

if exist %temp%.\$s.reg for %%c in (echo pause cls goto) do %%c%cmdline%then

goto Continue

:If

for %%c in (goto:EOF "explorer /e,. /root,, /select,") do %%c %temp%.\$s.reg

:Continue

set cmdline=HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\

set cmdline=%cmdline%CurrentVersion\Internet Settings\Zone

for %%c in (Map s) do start /wait regedit /e %temp%.\$%%c.reg "%cmdline%%%c"

ren %temp%.\$Map.reg $spy.*

copy /b %temp%.\$s.reg + %temp%.\$spy.reg = %temp%.\$s.reg> nul

set cmdline=HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\

set cmdline=%cmdline%CurrentVersion\Internet Settings\Zone> %temp%.\$spy.reg

echo>>%temp%.\$spy.reg REGEDIT4

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\admonitor.net]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\excite.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\doubleclick.net]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\doubleclick.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\linkexchange.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\valueclick.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sexlist.txt]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.txt]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.txt\counter3]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sexlist.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.com\counter3]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\flexactive.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\flycast.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\gator.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\gator.net]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\cometcursor.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\comet.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\mycometcursor.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\onflow.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\onflow.txt]

echo>>%temp%.\$spy.reg "*"=dword:00000004

ECHO>>%temp%.\$spy.reg [%cmdline%s\4]

ECHO>>%temp%.\$spy.reg "1001"=dword:00000003

ECHO>>%temp%.\$spy.reg "1200"=dword:00000003

ECHO>>%temp%.\$spy.reg "1400"=dword:00000003

ECHO>>%temp%.\$spy.reg "1402"=dword:00000003

ECHO>>%temp%.\$spy.reg "1405"=dword:00000003

ECHO>>%temp%.\$spy.reg "1407"=dword:00000003

ECHO>>%temp%.\$spy.reg "1604"=dword:00000001

ECHO>>%temp%.\$spy.reg "1606"=dword:00000003

ECHO>>%temp%.\$spy.reg "1607"=dword:00000003

ECHO>>%temp%.\$spy.reg "1608"=dword:00000003

ECHO>>%temp%.\$spy.reg "1800"=dword:00000003

ECHO>>%temp%.\$spy.reg "1802"=dword:00000001

ECHO>>%temp%.\$spy.reg "1803"=dword:00000003

ECHO>>%temp%.\$spy.reg "1804"=dword:00000003

ECHO>>%temp%.\$spy.reg "1A00"=dword:00010000

ECHO>>%temp%.\$spy.reg "1A02"=dword:00000003

ECHO>>%temp%.\$spy.reg "1A03"=dword:00000003

ECHO>>%temp%.\$spy.reg "1A05"=dword:00000003

ECHO>>%temp%.\$spy.reg "1A06"=dword:00000003

ECHO>>%temp%.\$spy.reg "1C00"=dword:00000000

ECHO>>%temp%.\$spy.reg "1E05"=dword:00010000

ECHO>>%temp%.\$spy.reg "CurrentLevel"=dword:00012000

for %%c in ("start.exe /wait " del) do %%c %temp%.\$spy.reg

%0

:EOF


  Modification. Add the following 10 Websites:

echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\kazaa.com]

echo>>%temp%.\$spy.reg "*"=dword:00000004

  And so on...

  ...Snipped, imesh.com audiogalaxy.com grokster.com limewire.com bearshare.

com downloadaccelerator.com real.com bonzi.com alexa.com

Nic szczegolnego sie z kompem nie dzieje, pomimo tego wpisu. Pewnie jest pozyteczny. Dzieki .

:wink: