Home Malware Programs Potentially Unwanted Programs (PUPs) TelemetricSys.exe CPU Miner

TelemetricSys.exe CPU Miner

Posted: February 6, 2018

Threat Metric

Threat Level: 6/10
Infected PCs: 83
First Seen: January 24, 2024
OS(es) Affected: Windows

The cryptocurrency boom we've experienced in the past year has made more and more cybercrooks explore ways that can be used to exploit innocent users for their own gain. One of the simpler, yet effective tools these people seem to use is called a Trojan miner – a utility, which is meant to work on the victim's computer to mine for various cryptocurrencies such as Monero silently. Usually, these miners focus on utilizing the computer's processor since these miners are far easier to set-up, and they can be run without showing any suspicious behavior.

These miners are usually installed automatically by being promoted as software cracks, CD-KEY generators or other illicit software. The good news is that miners like the TelemetricSys.exe CPU Miner are not threatening in terms of privacy since they are not meant to extract any sensitive information from the victim's computer or damage the files stored on it. However, what they can do is to put the CPU under constant load, therefore shortening its lifespan and diminishing the computer's overall performance. Since these miners are easy to build and many cybercrooks are using them, researchers are swamped with reports regarding various process names that are being used by these miners. Some of the other Trojan miners we've come across in recent days are:

Xmr-stak.exe, Bitcoin-miner.exe, Amworker.exe, Com Surrogate.exe, Sgminer.exe, Winpoint.exe, Csrcs.exe, Excavator.exe, Win32.exe, Msttc.exe, Fix.exe, Xerography.exe, Lsmos.exe, Calc.exe, Setrup.exe, Micirsoftl64.exe, Qsxc.exe, Yquw.exe, Sql59.exe, Dwnclear.exe, Searchfilterhost.exe, X64.exe, Xdediclogcleaner.exe, Msiexec.exe, Win1nit.exe, Xbooster.exe, Brhost.exe, Systemgo.exe, Systemhost.exe, Servicecs.exe, Bcompare.exe, Launcher.exe, Cpugpu.exe, St.exe, Systemf0d7.exe, Taskmg.exe, Mnhost.exe, Jusched.exe, Img002.exe, Hfdgghfff.exe, Comime.exe, Intelservice.exe, Serve.exe, Websock.exe, Hpdriver64.exe, Ntshot.exe, Mswinlib.exe, Googleupdat.exe, Wirstmgsvc.exe, Nssm.exe.

Usually, the crooks aim to drop these files in system folders or other directories that the users are unlikely to browse:

  • C:\Winsys
  • C:\Windows
  • C:\Program Files
  • C:\Program Data
  • C:\Program Files (x86)
  • %APPDATA%
  • %TEMP%

Users who are not experienced with computers might be unable to notice a Trojan miner working on their computers. However, if you consider yourself to be a tech-savvy user and suspect that a CPU miner might have been installed automatically, you should proceed to check the Windows Task Manager for any processes that consume an excessive amount of system resources. A simpler solution is to run a credible anti-malware scanner, which will notify you if there's any suspicious software present on your computer immediately.

Loading...