custom block updated 4/28/04

Discussion in 'SpywareBlaster & Other Forum' started by bdk, Apr 28, 2004.

Thread Status:
Not open for further replies.
  1. bdk

    bdk Guest

    found this at alt.privacy.spyware
    make a file called customblocking.txt and add the following to it
    and move in the the spywareblaster folder


    [Header]
    ListNumber=29

    [0]
    Name=ADW_SCANPORTAL.A | AdRoator
    CLSID={34EF5B1C-52CB-400b-8B7C-F787018B3826}
    [1]
    Name=ADW_SCANPORTAL.A | AdRoator (2)
    CLSID={3e7145b1-ea07-42ce-9299-11df39ff54bd}
    [2]
    Name=Adware.Chinet | CnsMin
    CLSID={1b0e7716-898e-48cc-9690-4e338e8de1d3}
    [3]
    Name=Backdoor.Autoupder (1)
    CLSID={6541B981-2E27-46B1-A2CC-8264A75B74FE}
    [4]
    Name=Backdoor.Autoupder (2)
    CLSID={C76BE992-2BC3-41A4-8B87-A8C01FE419A7}
    [5]
    Name=Backdoor.Autoupder (3)
    CLSID={9A05FE9B-5B52-4D13-A77D-FA7C38557A8E}
    [6]
    Name=Backdoor.Autoupder (4)
    CLSID={F53C844A-D9C8-4E92-B923-C05B46C4A7E3}
    [7]
    Name=Backdoor.Autoupder (5)
    CLSID={FBE091E5-DF43-4FFB-AECC-7E3A3BC7B0D9}
    [8]
    Name=BrowserAid/Startium stlbupdt.dll
    CLSID={2CF0B992-5EEB-4143-99C2-5297EF71F44B}
    [9]
    Name=CHM exploit (CWS - 008k.com)
    CLSID={11111111-1111-1111-1111-118413152376}
    [10]
    Name=CHM exploit (CWS - 008k.com)(2)
    CLSID={11111111-1111-1111-1111-118890292002}
    [11]
    Name=CHM exploit | capital-systems.net
    CLSID={11113111-1411-1611-8111-111111111413}
    [12]
    Name=ClientMan
    CLSID={0982868C-47F0-4EFB-A664-C7B0B1015808}
    [13]
    Name=ClientMan | urlclia30956de.dll
    CLSID={94927A13-4AAA-476A-989D-392456427688}
    [14]
    Name=HuntBar.ctoolb
    CLSID={339BB23F-A864-48C0-A59F-29EA915965EC}
    [15]
    Name=IncrediFindBHO
    CLSID={5D60FF48-95BE-4956-B4C6-6BB168A70310}
    [16]
    Name=InetSpeak/Iexplorr
    CLSID={90E34F98-E3E6-4CD7-A592-E964FED8AF78}
    [17]
    Name=NetworkEssentials | SmartPops.RH.exe
    CLSID={E79061BA-B6E7-4A9D-A07C-C3CB561013B4}
    [18]
    Name=Parasite.Whazit
    CLSID={D5B72AED-E54A-11D6-B1B2-444553540000}
    [19]
    Name=PeopleOnPage.AproposMedia
    CLSID={01C5BF6C-E699-4CD7-BEA1-786FA05C83AB}
    [20]
    Name=Redswoosh.com rsinstaller.cab
    CLSID={FF0C042C-98E9-4C36-B2EC-E21FDFDCEF75}
    [21]
    Name=SearchSprint Toolbar
    CLSID={AEE46806-2C5A-4A4E-A5DD-B4531F64A187}
    [22]
    Name=SubSearch | 01A00.DLL
    CLSID={00F16DC8-1B2A-42F4-B18B-E21DA9D2D7FD}
    [23]
    Name=TROJ_TOMADI.A | Adtomi.YahooStocks
    CLSID={B549456D-F5D0-4641-BCED-8648A0C13D83}
    [24]
    Name=Trojan.Bookmarker.C
    CLSID={3F143C3A-1457-6CCA-0A7-7AA23B61E40F}
    [25]
    Name=Trojan.Popdis
    CLSID={657F70CB-580A-412A-B71F-AA29DBEAC0C3}
    [26]
    Name=Visicom Toolbar | pickoftheweb.com
    CLSID={4E7BD74F-2B8D-469E-C0FF-FD7BA09AAA7D}
    [27]
    Name=Web P2P Installer
    CLSID={1D6711C8-7154-40BB-8380-3DEA45B69CBF}
    [28]
    Name=Winpage Blocker | WinPage.dll
    CLSID={12DF6E3E-6272-4AE8-880B-2158D60791C0}
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.