(random number).exe

Discussion in 'Malware Help (A Specialist Will Reply)' started by shaaaadoooow, Apr 13, 2013.

  1. shaaaadoooow

    shaaaadoooow Private E-2

    I see two (random number).exe processes in my Windows Task Manager list of processes. One of them consumes 13-20% of CPU power and the other consumes the rest. This makes my computer use very laggy and slow. I followed the read and run me process and I'm attaching the required files here. I think, after doing the read and run me process, I lost the (random number).exe process consuming 80-87% of my CPU power already. But still, I am not confident with the state of my computer.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Before we continue I would like for you to use MSConfig to put this machine back into normal start up mode



    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 17 detections:

    • [RUN][HJNAME] HKCU\[...]\Run : Client Server Runtime Process (C:\Users\D\AppData\Roaming\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKCU\[...]\Run : Host-process Windows (Rundll32.exe) (C:\Users\D\AppData\Roaming\System32\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKCU\[...]\Run : Service Host Process for Windows (C:\Users\D\AppData\Roaming\System32\svchost.exe) [-] -> FOUND
    • [RUN][ROGUE ST] HKCU\[...]\Run : 1DFAGX (C:\Users\D\AppData\Local\Temp\5521403189.exe) [-] -> FOUND
    • [RUN][ROGUE ST] HKCU\[...]\Run : MSNetDDNowiz ("C:\Users\D\AppData\Local\Temp\1347148654.exe") [-] -> FOUND
    • [RUN][HJNAME] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Run : Client Server Runtime Process (C:\Users\D\AppData\Roaming\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Run : Host-process Windows (Rundll32.exe) (C:\Users\D\AppData\Roaming\System32\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Run : Service Host Process for Windows (C:\Users\D\AppData\Roaming\System32\svchost.exe) [-] -> FOUND
    • [RUN][ROGUE ST] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Run : 1DFAGX (C:\Users\D\AppData\Local\Temp\5521403189.exe) [-] -> FOUND
    • [RUN][ROGUE ST] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Run : MSNetDDNowiz ("C:\Users\D\AppData\Local\Temp\1347148654.exe") [-] -> FOUND
    • [RUN][HJNAME] HKLM\[...]\Wow6432Node\Run : Client Server Runtime Process (C:\Users\D\AppData\Roaming\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKLM\[...]\Wow6432Node\Run : Host-process Windows (Rundll32.exe) (C:\Users\D\AppData\Roaming\System32\csrss.exe) [-] -> FOUND
    • [RUN][HJNAME] HKLM\[...]\Wow6432Node\Run : Service Host Process for Windows (C:\Users\D\AppData\Roaming\System32\svchost.exe) [-] -> FOUND
    • [RUN][ROGUE ST] HKLM\[...]\Policies\Explorer\Run : 39525 (c:\ProgramData\dxopuyopt.exe) -> FOUND
    • [RUN][ROGUE ST] HKLM\[...]\Wow6432Node\Policies\Explorer\Run : 39525 (c:\ProgramData\dxopuyopt.exe) -> FOUND
    • [SHELL][SUSP PATH] HKCU\[...]\Windows : Load (c:\users\d\dxqsbubpn.exe) [x] -> FOUND
    • [SHELL][SUSP PATH] HKUS\S-1-5-21-2139273342-2939729671-2513340513-1000[...]\Windows : Load (c:\users\d\dxqsbubpn.exe) [x] -> FOUND


    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :Files
    C:\Users\D\AppData\Roaming\csrss.exe
    C:\Users\D\AppData\Roaming\System32\svchost.exe
    C:\Users\D\AppData\Roaming\System32\svchost.exe
    C:\Users\D\AppData\Local\Temp\5521403189.exe
    C:\Users\D\AppData\Local\Temp\1347148654.exe
    c:\ProgramData\dxopuyopt.exe
    c:\users\d\dxqsbubpn.exe
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Re run RogueKiller, just a scan, and attach the log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. shaaaadoooow

    shaaaadoooow Private E-2

    I tried doing what was said in the previous post but I encountered a problem as soon as I ran RogueKiller. I couldn't find all of the 17 detections that I was supposed to delete. I may have done something in the past month that modified my files, for example, I think I have deleted the 552(...).exe. It may be the reason why the RogueKiller registry tab didn't show what I was going to delete. Therefore, I decided to do the read and run me process again since a month has already passed and things may have changed. The files are attached here.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry about the delay.

    You do not appear to be using Run As Administrator to run programs. Especially MGtools ( that is GetLogs.bat last time ). You need to make sure that when you run programs we ask you to run that you always right click and then select Run As Administrator. Also make sure that UAC is still disable otherwise it will still get in the way. So let's try another fix.


    Run OTM again (Note: use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\D\AppData\Local\Temp\1607620284.exe
    C:\Users\D\hysciwygikle.exe
    c:\ProgramData\dxopuyopt.exe
    C:\Windows\SysWOW64\IkvumwirVojh.dll
    C:\Users\D\*.exe
    C:\$Recycle.Bin\S-1-5-21-2139273342-2939729671-2513340513-1000\*.*
    C:\Windows\TEMP\*.*
    C:\Users\D\AppData\Local\Temp\*.*
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds