Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 26 December 2011

Remove Ping.exe, 100% CPU Usage Problem

Posted on 12:36 by Unknown
Ping.exe is a command line utility available in Windows OS. It was created to verify whether a specific computer on a network or the Internet exists and is connected. The legit utility runs from C:\WINDOWS\system32\. Normally, it shouldn't cause any problems. Unfortunately, there are malicious programs posing as Ping.exe and chewing up your CPU usage. You can stop Ping.exe using Task Manager but it will re-spawn within minutes and cause the same 100% CPU usage as before.

In our case it was the notorious TDSS/Alureon rootkit. You can remove this rootkit easily using TDSSKiller. It is also worth mentioning, that this rootkit was hiding the presence of Trojan droppers. Such combination made our computer act as a zombie, not to mention that cyber crooks could easily steal every bit of information from our system. If you are in a lot of trouble with 100% CPU and pop-ups that are contently asking your permission to make changes to the system or download files from the internet, please follow the removal instructions below. Your computer is probably infected with malicious software. And if you need extra help removing ping.exe and fixing 100% CPU usage problem, please leave a comment below. Good luck and be safe online!


Remove Ping.exe

1. First of all, try to stop ping.exe or at least suspend it:

1. Open Task Manager
2. Click Performance
3. Click Resource Monitor
4. Right-click Ping.exe and choose Suspend process.

2. Download recommended anti-malware software and run a full system scan to detect and remove this malware.







Share this information with your friends:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Process Information | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Remove Adware.StartPage (Uninstall Guide)
    Adware.StartPage pretends to be a valid program but actually it is an adware that modifies the Internet Explorer home page without the user...
  • WebCake Adware Removal Guide
    If you’re reading this it is very likely that your computer is infected with WebCake adware which displays extremely obnoxious and intrusiv...
  • Show Hidden Files and Folders in Windows
    By default Microsoft Windows hides important files from being seen with Windows Explorer in order to protect these files from being modified...
  • Remove Windows XP Recovery (Uninstall Guide)
    Windows XP Recovery is a fake computer repair and optimization program that reports nonexistent security threats, registry errors and some ...
  • Remove "System Check" (Uninstall Guide)
    System Check is malicious software posing as Windows system utility. Although, it may look like a real thing, it isn't! You are actuall...
  • SaaS - Cloud Computing
    What is Software as a Service (SaaS)? Software as a Service (SaaS) is a cloud computing model, which hosts various software applications and...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ►  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ▼  2011 (239)
    • ▼  December (8)
      • Remove "System Check" (Uninstall Guide)
      • Theworld.exe Process Information
      • Remove Trojan Ramage (Uninstall Guide)
      • Remove Ping.exe, 100% CPU Usage Problem
      • Remove Home Security Solutions (Uninstall Guide)
      • How to Remove Security Monitor 2012 (Uninstall Guide)
      • How to Remove Antivirii 2011 (Uninstall Guide)
      • Winxn.exe Process Information
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile