|
Name der Infizierung Standort Risiko <br /><br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE## Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE##NextInstance Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000 Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000## Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##Class Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##ClassGUID Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##ConfigFlags Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##DeviceDesc Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##Legacy Erhöht <br />Borlander HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_STDSERVICE\0000##Service Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE## Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE##NextInstance Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000 Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000## Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##Class Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##ClassGUID Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##ConfigFlags Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##DeviceDesc Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##Legacy Erhöht <br />Borlander HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_STDSERVICE\0000##Service Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE## Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE##NextInstance Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000 Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000## Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##Class Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##ClassGUID Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##ConfigFlags Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##DeviceDesc Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##Legacy Erhöht <br />Borlander HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_STDSERVICE\0000##Service Erhöht <br /><br /><br />Name: Borlander <br />Risk Level: <br />Description: Borlander is a chinese adware program which is silently installed onto your PC and displays pop-up advertisements. <br />Type: Adware <br />Also known as: Adware.Borlan [Symantec] MMSAssist <br /><br /><br />有谁知道这个Ad-Ware怎么删不,我删不它,在注册表里找得到,可不让删,就连在安全模式下也删不掉。<br /><br /><br />求救,求救呀 <!--emo&:^:--><img src='style_emoticons/<#EMO_DIR#>/cry_smile.gif' border='0' style='vertical-align:middle' alt='cry_smile.gif' /><!--endemo--> <!--emo&:^:--><img src='style_emoticons/<#EMO_DIR#>/cry_smile.gif' border='0' style='vertical-align:middle' alt='cry_smile.gif' /><!--endemo--> <br /> |
|