Hello iNeed (and anyone else who may come across this thread).
I got the same infection (not long after this thread was started actually).
I got it from the Vuze installer, downloaded from http://sourceforge.net/projects/azureus/
It installed a package of malware -- including the infamous "PC Optimizer Pro" -- that hijacked all of my browsers (Firefox, Opera and IE), launched fake "You're Infected!" prompts and launched processes that tried to access the Internet (and my networked computers) from every angle.
I removed the malware using Malwarebytes Anti-Malware, just as you did, and some sort of hidden launcher remained on my computer that tried to launch the now-removed malware file(s) via cmd.exe, just as it did in your case.
It looks like this hidden launcher might be operating via exploitation of the Background Intelligent Transfer Service (BITS).
I don't know for sure if that's the case. It's just a possibility.
The only two files on my computer that contain the unique numbers found in the command string are found at the following locations:
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
That Downloader folder, as I understand it, is the folder used by the BITS.
And if you search the web for those file paths, you'll come across details for a couple of known types of malware.
Personally, I deleted qmgr0.dat and qmgr1.dat
I first had to end the running svchost.exe process associated with the two files. You can use Ctrl+F in Process Explorer to find out which svchost.exe process you should end, or you can just try ending them all.
I also disabled the Background Intelligent Transfer Service since I only turn on Automatic Updates occasionally anyway, and can always just re-enable the BITS on those occasions. Instructions for disabling the BITS are easy to find online.
Edited by TryKindness, 03 February 2015 - 03:55 PM.