Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: Immunization changed from 9239 to 7577

  1. #1
    Junior Member
    Join Date
    Mar 2006
    Posts
    5

    Default Immunization changed from 9239 to 7577

    Hi all, first time at this forum, for some reason after the 3-10-06 update it showed 9239 immunized, after I re-started my PC it now shows 7577. I have tried un-installing and in-stalling and I can't get past 7577. What happened? I never had a problem with spybot before

  2. #2
    Member stevek's Avatar
    Join Date
    Jan 2006
    Posts
    42

    Default

    It probably has to do with your authority to change registry keys. See this thread (MD USA Spybot Fan's post #2) for explanation:

    http://forums.spybot.info/showthread...t=immunization

    This thread explains that the dif should be 1662 (your dif) after 3/10/06.

    http://forums.spybot.info/showthread...t=immunization

  3. #3
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    stevek:

    Quote Originally Posted by stevek
    It probably has to do with your authority to change registry keys.
    You could be right because I've never heard of anything quite like this.

    slotdr:

    Are you running Windows XP?

    If so, how many user accounts are there on the system by type (Computer Administrator, Limited, Power User and Guest).

    Are you running the Spybot Immunize from the same user account with the same access rights that you were before the immunization count dropped? What type on account is that?

    Have you re-booted again since Spybot’s immunization count dropped and if so has the count returned to 9239?

    Between the time the count was 9239 and it was 7577 did you do anything that:
    1. Could have affected the user's access to the system Registry?
    2. May have changed the registry, like use a Registry cleaner, etc.?


    ***********

    My first inclination is to suggest that you do a system restore to a point prior to when this happened.

    ***********

    Assuming that you are running Windows XP, the user account that you are immunizing from is the same user account where the counts came from initially, no changes were made to that user account and that you did not perform some sort of cleanup of the registry; the only thing that I can think of is that the user lost access to an entire group of Registry keys.

    If you can not figure out what may have happened:
    • Download the attached RegExport.zip file.
    • Extract RegExport.bat into its own folder (see Note #1).
    • Execute RegExport.bat by double clicking on it.
    • After the execution of RegExport.bat it should have created a RegExport.txt file (see Note #2). Copy the contents of the RegExport.txt file to the clipboard:
      1. Double click on the RegExport.txt file and it should open with Notepad.
      2. Select all (Ctrl+A)
      3. Copy (Ctrl+C)
    • Then Paste (Ctrl+V) into a new post (reply) in this thread.

    Then we can see what Registry keys are/are not accessible by the user.

    Note #1: The code in the RegExport.bat.

    Code:
    Echo RegExport
    
    del "RegExport.txt" "RegExport.tmp"
    
    reg export "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat1
    copy "RegExport.tmp" "RegExport.txt"
    goto around1
    :concat1
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around1
    del "RegExport.tmp"
    
    reg export "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat2
    copy "RegExport.tmp" "RegExport.txt"
    goto around2
    :concat2
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around2
    del "RegExport.tmp"
    
    reg export "HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat3
    copy "RegExport.tmp" "RegExport.txt"
    goto around3
    :concat3
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around3
    del "RegExport.tmp"
    
    reg export "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat4
    copy "RegExport.tmp" "RegExport.txt"
    goto around4
    :concat4
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around4
    del "RegExport.tmp"
    
    reg export "HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat5
    copy "RegExport.tmp" "RegExport.txt"
    goto around5
    :concat5
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around5
    del "RegExport.tmp"
    
    reg export "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com" "RegExport.tmp"
    
    if exist "RegExport.txt" goto concat6
    copy "RegExport.tmp" "RegExport.txt"
    goto around6
    :concat6
    Copy "RegExport.txt"+"RegExport.tmp" "RegExport.txt"
    :around6
    del "RegExport.tmp"
    Note #2: The output that I get (Windows XP Home from a Computer Administrator account).

    Code:
    Windows Registry Editor Version 5.00
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005
    
    Windows Registry Editor Version 5.00
    
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005
    
    Windows Registry Editor Version 5.00
    
    [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005
    
    Windows Registry Editor Version 5.00
    
    [HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005
    
    Windows Registry Editor Version 5.00
    
    [HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005
    
    Windows Registry Editor Version 5.00
    
    [HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  4. #4
    Junior Member
    Join Date
    Mar 2006
    Posts
    5

    Default

    Thanks for your help, I am the only user on this PC, this happened after I repaired Microsoft office 2000. When I restore a image dated 3-10-06 it 9239 but then Microsoft word doesn't work correctly so I fix it with the CD and I'm back to 7577. The reg. zip file looked complicated to add,does anyone have a reg file I can just merge in my registry

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005

    Windows Registry Editor Version 5.00

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005

    Windows Registry Editor Version 5.00

    [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005

    Windows Registry Editor Version 5.00

    [HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\180solutions.com]
    @=dword:00000005

    圚椀渀搀漀眀猀 刀攀最椀猀琀爀礀 䔀搀椀琀漀爀 嘀攀爀猀椀漀渀 㔀⸀  ഀ਀ഀ਀嬀䠀䬀䔀夀开唀匀䔀刀匀尀匀ⴀ㄀ⴀ㔀ⴀ㈀ 尀匀伀䘀吀圀䄀刀䔀尀䴀椀挀爀漀猀漀昀琀尀圀椀渀搀漀眀猀尀䌀甀爀爀攀渀琀嘀攀爀猀椀漀渀尀䤀渀琀攀爀渀攀琀 匀攀琀琀椀渀最猀尀倀㌀倀尀䠀椀猀琀漀爀礀尀㄀㠀 猀漀氀甀琀椀漀渀猀⸀挀漀洀崀ഀ਀䀀㴀搀眀漀爀搀㨀       㔀ഀ਀ഀ਀
    Last edited by slotdr; 2006-03-17 at 05:17.

  5. #5
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    I think that you may have a problem with your registry. Compare you registry with the way mine looks:
    • Go into Start > Run… > type "regedit" (no quotes) > then click "OK".
    • Expand HKEY_USERS by clicking the + (plus sign) in front of it.
    • Does your registry look like the attached thumbnail?


    Quote Originally Posted by slotdr
    The reg. zip file looked complicated to add,does anyone have a reg file I can just merge in my registry
    I don't know what reg. zip file you are referring to.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  6. #6
    Junior Member
    Join Date
    Mar 2006
    Posts
    5

    Default

    This is mine, XP home

  7. #7
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    It looks like you are either missing HKEY_USERS\S-1-5-19 or the user no longer can access it.

    HKEY_USERS\S-1-5-19 is the user profile for SID (security identifier) S-1-5-19.

    S-1-5-19 is the security identifier for LocalService:
    • An identity used by services that are local to the computer, have no need for extensive local access and do not need authenticated network access. Services that run as LocalService access local resources as ordinary users, and access network resources as anonymous users. As a result, a service that runs as LocalService has significantly less authority than a service that runs as LocalSystem — both locally and on the network.

    I don’t what to tell you other that try to boot in safe mode and see if the HKEY_USERS\S-1-5-19 profile is visible there and if so look at the permissions. However, from the garbled listing that you posted earlier it looks like you have a corrupted registry.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  8. #8
    Junior Member
    Join Date
    Mar 2006
    Posts
    5

    Default Thanks

    Thanks everyone, problem solved. After reading the last post I realized I disabled windows user mode driver framework in my services,when I put it back to automatic I get 9239 in immunization. Thanks again

  9. #9
    Junior Member
    Join Date
    Mar 2006
    Posts
    7

    Default Immunization changed from 9239 to 757

    Hello
    I am facinated by this thread since I too have 9239 bad products blocked and I have often wondered where this number came from,.Presumably it comes from the down load details(or am I off course with this presumption? )
    14771820

  10. #10
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    When you “Immunize”, entries are added to the system Registry. This blocks cookies from some sites, places other sites in the restricted zone and blocks the download/execution of selected ActiveX scripts.

    The counts you receive during Spybot’s immunization is not the number of different items that Spybot is protecting you against it is actually the count of the items that Spybot is adding or attempting to add to the system’s Registry. Depending on the type of immunization, Spybot may add the same entries into multiple Registry keys not to just to one key. Spybot attempts to immunize in the following registry keys:
    • ActiveX Blocking
      Code:
      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility]
    • Cookie Blocking
      Code:
      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
      [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
      [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
      [HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
      [HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
      [HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History]
    • Restricted Zone by Domain (Site Name)
      Code:
      [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
      [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
      [HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
      [HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
      [HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
    • Restricted Zone by Range (IP Address)
      Code:
      [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
      [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
      [HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
      [HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
      [HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]

    If those registry keys and/or hives are not valid on a particular operating system or a user does not have authorization to add entries to those keys, the immunization counts will vary.

    Other threads about immunization:

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •