![]() |
| |||||||
Plagegeister aller Art und deren Bekämpfung: tpnumlk.exe , csrss.exe , winlogon.exe ohne Benutzer und Beschreibung im Task-Manager (Win7)Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
| | #13 |
![]() | tpnumlk.exe , csrss.exe , winlogon.exe ohne Benutzer und Beschreibung im Task-Manager (Win7) Gesagt, getan: All processes killed ========== OTL ========== Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\Userinit deleted successfully. C:\Users\EICHI\AppData\Roaming\appconf32.exe moved successfully. C:\Users\EICHI\AppData\Roaming\5051\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5051 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5050\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5050 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5049\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5049 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5048\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5048 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5047\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5047 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5045\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5045 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5044\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5044 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5043\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5043 folder moved successfully. C:\Users\EICHI\AppData\Roaming\5042\components folder moved successfully. C:\Users\EICHI\AppData\Roaming\5042 folder moved successfully. C:\Users\EICHI\AppData\Roaming\xmldm folder moved successfully. C:\Users\EICHI\AppData\Roaming\kock folder moved successfully. ========== FILES ========== File\Folder C:\Users\EICHI\AppData\Roaming\appconf32.exe not found. ========== COMMANDS ========== [EMPTYFLASH] User: All Users User: Default User: Default User User: EICHI ->Flash cache emptied: 6224327 bytes User: Public Total Flash Files Cleaned = 6,00 mb [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: EICHI ->Temp folder emptied: 25836010 bytes ->Temporary Internet Files folder emptied: 2604613 bytes ->Java cache emptied: 1783779 bytes ->FireFox cache emptied: 53657175 bytes ->Flash cache emptied: 0 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32 (64bit) .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 531320 bytes %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 102427 bytes RecycleBin emptied: 0 bytes Total Files Cleaned = 81,00 mb OTL by OldTimer - Version 3.2.31.0 log created on 12012011_181515 Files\Folders moved on Reboot... C:\Users\EICHI\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully. Registry entries deleted on Reboot... |
| Themen zu tpnumlk.exe , csrss.exe , winlogon.exe ohne Benutzer und Beschreibung im Task-Manager (Win7) |
| anderen, anleitung, antivir, avira, benutzer, ccleaner, csrss.exe, entfernt, forum, hallo zusammen, meldungen, prozesse, ratlos, registry, schutz, spy.banker.gen2, stil, system, systemwiederherstellung, task-manager, taskmanager, trojaner, viren, win7, winlogon.exe, zurückverfolgen |