Jump to content

GPU and CPU utilization very high, until I open Task Manager

Go to solution Solved by MKDB,

Recommended Posts


I've seen numerous treads on this topic, but given the complexity of the solution, I thought creating a new one, for my particular case.

Namely - I notice it in web browsing, gaming (especially) and overall usage of my laptop - things are very slow until I open the Task Manager, where the impression is malicious software starts hiding from me but turning itself off. I've done some research here and it appears that it could be crypto mining software. Malwarebytes is not able to scan/fix it.

Let me know if you could help me with a step-by-step solution so I can get back to normal.

Many thanks!

Link to post
Share on other sites

Hello @jaksa23  and  :welcome:


My name is MKDB and I will assist you.



Some ground rules:

  • Please follow the steps in the given order and post back the log files.
  • Please attach all log files into your post.
  • Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
  • Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
  • Searching, detecting and removing malware isn't instantaneous and there is no guarantee to repair every system. Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Please be patient and stick with me until I give you the "all clear".
  • Only run the tools I guide you to. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • Cracked or hacked or pirated programs are not only illegal, but also will make a computer a malware victim. Having such programs installed, is the easiest way to get infected. It is the leading cause of ransomware encryptions. It is at times also big source of current trojan infections. Please uninstall them now, if any are here, before we start the cleaning procedure.
  • As English is not my native language, please do not use slang or idoms. It may be hard for me to understand.
  • If you do not respond within 4 days, your topic will be closed.



Step 1

  • Please download the Malwarebytes Support Tool (MBST).
  • Run MBST and accept license agreement.
  • In the left navigation pane of MBST, click Advanced.
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine.
  • A zip file named mbst-grab-results.zip will be saved to your desktop, please upload that file on your next reply.




Link to post
Share on other sites

Hello MKDB!

Thank you so much for the fast reply!

I've done the following, in this order:

  1. Disabled all antivirus/security software
  2. Made sure there's no pirated software installed
  3. Backed-up my essential private data
  4. Created System Restore image in Windows, using Windows Backup and Restore function in Control Panel (just in case)
  5. Downloaded MBST and run the scan
  6. Turned the antivirus software back on

Waiting on your lead.


Link to post
Share on other sites

First, we run a FRST-fix in order to remove the infection. Please be patient during the fix and do not interfere... it may take some minutes to finish.

More steps will follow, but let's do one step first.

Thank you @jaksa23.


Step 1

  • Please download the attached fixlist.txt file and save it to your download folder, which is C:\users\psilocibin\Downloads\ in your case.
  • You will find the file FRSTEnglish.exe (FRST) as well in this folder.

Note: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  • Close all open programs and save your work.
  • Run FRST again.
  • Press the Fix button only once and wait. Please be patient.
  • If the tool needs a restart, please make sure you let the system restart normally and let the tool complete its run after restart.
  • FRST will create one log now (Fixlog.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.






Link to post
Share on other sites


As you've said.

You'll find the Fixlog.txt attached to the post.

Just a side note - as this is a habit at this point, after computer restarted I have turned on Task Manager, still to observe CPU usage being over 70% without any active applications running, only to cut down to <7% shortly after.

Looking forward to the next step.


Link to post
Share on other sites

Thank you @jaksa23.

We will check the system with Adwcleaner, MSS and a fresh FRST scan.



Step 1

Please download AdwCleaner and save it to your desktop.

  • Double-click to run it.
  • Accept the End User License Agreement.
  • Click Scan Now.
  • When finished, if items are found please click Next / Quarantine.
  • Maybe your PC will be rebooted, AdwCleaner will be opened automatically.
  • Click View Log File.
  • AdwCleaner will open one log (AdwCleaner[Cxx].txt).
  • Please paste the log to your next reply.




Step 2

The Microsoft Safety Scanner (MSS) is a free Microsoft stand-alone virus scanner that can be used to scan for & remove malware or potentially unwanted software from a system.

  • The download links & the how-to-run-the tool are at this link at Microsoft.
  • Please let me know the results of this scan.
  • Run a Quick Scan.
  • The log is named MSERT.log.
  • The log will be at%SYSTEMROOT%\debug\msert.log which in most cases is


  • Please attach that log with your next reply.




Step 3

  • Run FRST again.
  • Do not change any settings.
  • Press the Scan button.
  • FRST will create two logs now (FRST.txt + Addition.txt) in the same directory the tool is run.
  • Please attach these logfiles to your next reply.




Link to post
Share on other sites

Hey again,

  • Here's the AdwCleaner[Cxx].txt contents:

    # -------------------------------
    # Malwarebytes AdwCleaner
    # -------------------------------
    # Build:    03-23-2022
    # Database: 2022-06-24.1 (Cloud)
    # Support: https://www.malwarebytes.com/support
    # -------------------------------
    # Mode: Clean
    # -------------------------------
    # Start:    07-12-2022
    # Duration: 00:00:01
    # OS:       Windows 10 Education
    # Cleaned:  5
    # Failed:   0

    ***** [ Services ] *****

    No malicious services cleaned.

    ***** [ Folders ] *****

    Deleted       C:\Users\psilocibin\AppData\Roaming\Tencent

    ***** [ Files ] *****

    Deleted       C:\END

    ***** [ DLL ] *****

    No malicious DLLs cleaned.

    ***** [ WMI ] *****

    No malicious WMI cleaned.

    ***** [ Shortcuts ] *****

    No malicious shortcuts cleaned.

    ***** [ Tasks ] *****

    No malicious tasks cleaned.

    ***** [ Registry ] *****

    Deleted       HKCU\Software\Conduit
    Deleted       HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run|Web Companion
    Deleted       HKLM\Software\Wow6432Node\Conduit

    ***** [ Chromium (and derivatives) ] *****

    No malicious Chromium entries cleaned.

    ***** [ Chromium URLs ] *****

    No malicious Chromium URLs cleaned.

    ***** [ Firefox (and derivatives) ] *****

    No malicious Firefox entries cleaned.

    ***** [ Firefox URLs ] *****

    No malicious Firefox URLs cleaned.

    ***** [ Hosts File Entries ] *****

    No malicious hosts file entries cleaned.

    ***** [ Preinstalled Software ] *****

    No Preinstalled Software cleaned.


    [+] Delete Tracing Keys
    [+] Reset Winsock


    AdwCleaner[S00].txt - [1679 octets] - [12/07/2022 17:16:36]

  • Attached the MSS Log here 

  • Attached FRST and Addition files too

    Waiting on you!

msert.log FRST.txt Addition.txt

Link to post
Share on other sites

Tcpip\Parameters: [DhcpNameServer] done @jaksa23.


Please note:

Whenever I run the task manager on my own system, the CPU usage is over 70% as well. After some seconds, it goes down to 5-10%. So that "behaviour" is normal and does not automatically mean that your system is infected with malware.

We successfully removed the active malware with FRST.


Are you from serbia? I noticed this DHCPNameServer in FRST logfile:
Tcpip\Parameters: [DhcpNameServer]

Please let me know!



Just to be sure that there are no known leftovers, I would like you to run KVRT and ESET. Two powerful tools. Those scans may take some time, but its worth running them.

Thanks again for your cooperation, you're doing great!



Step 1

Download Kaspersky Virus Removal Tool (KVRT) and save to your Desktop (<-- that is important).

  • Select the Windows Key and R Key together, the Run box should open.
  • Copy and paste the following string into the line:

C:\Users\psilocibin\DESKTOP\KVRT.exe -dontencrypt

  • Select „Ok“ in the Run box.
  • If the „Windows protected your PC“ window opens, select „More info“. A new windows will open, select „Run anyway“.
  • An EULA window from KVRT will open, tick all confirmation boxes then select "Accept".
  • A windows from KVRT will open, select "Change Parameters".
  • In the new window ensure the following boxes are ticked
    • System memory
    • Startup objects
    • Boot sectors
    • System drive
  • Then select "OK" and „Start scan“.
  • When completed: If entries are found, there will be options to choose. If "Cure" is offered, leave as it is. For any other options change to "Delete", then select "Continue".
  • Usually, your system needs a reboot to finish the removal process.
  • A logfile can be found on your systemdrive (usually C: ), similar like this:


  • Right click direct onto that report, select > open with > Notepad.
  • Save that file and attach it with your next reply.




Step 2

Let me have you run a different scanner to double-check. I don't expect it to find anything, but no harm in checking.

I would suggest a free scan with the ESET Online Scanner

Go to https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe


  • It will start a download of "esetonlinescanner.exe".
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get it started. 
  • When presented with the initial ESET options, click on "Computer Scan".
  • Next, when prompted by Windows, allow it to start by clicking Yes.
  • When prompted for scan type, Click on Full scan
  • Look at & tick  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click on the Start scan button.
  • Have patience.  The entire process may take an hour or more. There is an initial update download.
  • There is a progress window display.
  • You should ignore all prompts to get the ESET antivirus software program.  (e.g. their standard program). You do not need to buy or get or install anything else.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log.
  • If something was removed and you know it is a false finding, you may click on the blue ”Restore cleaned files”  (in blue, at the bottom).
  • Press Continue when all done.  You should click to off the offer for “periodic scanning”.


Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3





Edited by MKDB
Link to post
Share on other sites

Hey again MKDB,

Regarding your note - although perceived as normal, it really hinders the work. If I do not turn on the Task Manager, and I open multiple web browser tabs, and also other application - computer is noticeably slow. As soon as Task Manager is opened, it starts working faster.

Thanks for the support so far though! I am indeed from Serbia, from Belgrade, why you ask? :)

  • I will paste the Kaspersky log below, as it doesn't save as .txt file after I click on Save As in Notepad, but it remains as .klr file. Apparently it found 1 threat, a file already quarantined by FRST.

        <Metadata Version="1" PCID="{13AE8287-EC1F-3754-D7AE-FF842776678F}" LastModification="2022.07.13 10:10:57.149" />
            <Block0 Type="Scan" Processed="740583" Found="1" Neutralized="1">
                <Event0 Action="Scan" Time="133021699892586604" Object="" Info="Started" />
                <Event1 Action="Detect" Time="133021702794069407" Object="C:\FRST\Quarantine\C\WINDOWS\System32\Tasks\Microsoft\Windows\AppID\AppID.xBAD" Info="HEUR:Trojan.Multi.Powesta.gen" />
                <Event2 Action="Scan" Time="133021729096422635" Object="" Info="Finished" />
                <Event3 Action="Select action" Time="133021734098423208" Object="C:\FRST\Quarantine\C\WINDOWS\System32\Tasks\Microsoft\Windows\AppID\AppID.xBAD" Info="Delete" />
                <Event4 Action="Disinfection" Time="133021734098433195" Object="" Info="Started" />
                <Event5 Action="Quarantined" Time="133021734098512988" Object="C:\FRST\Quarantine\C\WINDOWS\System32\Tasks\Microsoft\Windows\AppID\AppID.xBAD" Info="" />
                <Event6 Action="Deleted" Time="133021734098512988" Object="C:\FRST\Quarantine\C\WINDOWS\System32\Tasks\Microsoft\Windows\AppID\AppID.xBAD" Info="" />
                <Event7 Action="Disinfection" Time="133021734101034812" Object="" Info="Finished" />
  • Attaching the ESET log

    Thanks again! Let me know if there's anything else to do.


Link to post
Share on other sites

Thanks @jaksa23 again.

No active malware found by KVRT and ESET, that's good.


I've noticed a DHCPNameServer in FRST logfiles that is pointing to serbia, so I just wanted to make 100% sure that there is no kind of hijack this way.

Please run the following fix to check windows system files. This may take some time.




Step 1

  • Please download the attached fixlist.txt file and save it to the location where you ran FRST from ( C:\Users\psilocibin\Downloads\ ).

Note: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  • Close all open programs and save your work.
  • Run FRST again.
  • Press the Fix button only once and wait. Please be patient.
  • If the tool needs a restart, please make sure you let the system restart normally and let the tool complete its run after restart.
  • FRST will create one log now (Fixlog.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.




Link to post
Share on other sites

  • Solution

You're welcome @jaksa23.

Everything is fine here.


Thank you for your cooperation, we're done. 👍


Final Step

  • Right-Click on FRST64 and choose Rename.
  • Rename FRST64 into Uninstall.
  • Run Uninstall.
  • FRST and it’s files/folders will be deleted.
  • If the tool needs a restart, please make sure you let the system restarts normally.




A few final recommendations:

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 
  6. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin


Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes.



Link to post
Share on other sites

  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following to help you better protect your computer and privacy Tips to help protect from infection

Thank you



Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.