Jump to content
Johnwesley

Powershell.exe - CPU utilization more than 80% in windows machines

Recommended Posts

Dear Team,

Recently few days back i had found the new malware in our work group computers. It is named powershell.exe, we can find it in task manager in processes tab. It utilizing more CPU it causes impact to all other applications running in the CPU. I had tried malwarebytes and some other antivirus tools but those are not detecting this bug. Please help us solve the issue. Malware programmers create files with virus codes and named it powershell.exe to spread malware on the internet. we need serious attention here to block and remove it in the network. Please help us to do it. 

 

 

Regards

John.

Share this post


Link to post
Share on other sites

Hello @Johnwesley and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, please click Clean & Repair.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a checkmark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Share this post


Link to post
Share on other sites

Dear Ron,

Few days back, some of the workstations and servers got attacked by rare malicious virus which infects the existing process of windows and make it to utilize the max CPU and starts mining the data and sending it to profetestruec.net (128.14.23.149). we are unable to detect it with antivirus and windows security patch updates, some other malware removal tools.  Find the below snap shots, windows powershell.exe is malfunctioning here. Please do needful.

Malicious attacks.zip

Edited by AdvancedSetup
removed quote

Share this post


Link to post
Share on other sites

Thanks John @Johnwesley

I do not see the Malwarebytes log or the AdwCleaner log.

Can you please follow the step again as posted above and post back all of the requested logs.

Thank you

Ron

 

Share this post


Link to post
Share on other sites

Dear Ron,

 

Thanks for your response. I had sorted out it with the eset endpoint security. 

 

 

Regards

John.

 

Share this post


Link to post
Share on other sites

Okay, thanks for the follow up John.

The logs showed that there was a bad WMI injected threat launching PowerShell

It does show in our database, so a normal Threat Scan should have detected and removed it but regardless. Glad all is better now.

Take care

Ron

 

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.