Some program is using my gpu, and its really sneaky. What can I do?

Title: Discovering Unauthorized GPU Usage: Steps to Identify and Resolve the Issue

Recently, I stumbled upon a troubling situation involving my computer’s GPU. It appears that a suspicious program was secretly utilizing my graphics processing unit, potentially for nefarious purposes such as cryptocurrency mining. Despite seeing minimal GPU usage in the Task Manager, the system settings showed a significant amount when running certain applications, particularly games.

Initially, I discovered a trojan that had disabled Windows Defender, allowing these intrusive processes to run unchecked. After reactivating Windows Defender, I was able to remove several viruses, but I was still uncertain about what specific application was hijacking my GPU.

This experience made me realize the importance of having the right tools and knowledge to identify such unauthorized usage. While I managed to solve the problem, I want to share some steps that can help others facing a similar challenge.

  1. Use Task Manager: This built-in tool allows you to monitor GPU usage. A discrepancy between low utilization in the Task Manager and high utilization in other settings may indicate hidden processes.

  2. Download GPU Monitoring Software: Tools like MSI Afterburner or GPU-Z can provide deeper insights into what’s using your GPU. They can help identify suspicious activity or unauthorized applications.

  3. Check for Malware: Utilize trusted antivirus or anti-malware solutions to perform a thorough scan of your system. This can help eliminate any remaining threats that might be lurking.

  4. Review Startup Programs: Sometimes, harmful applications configure themselves to launch during startup. Check the Startup tab in Task Manager or use tools like Autoruns to review and disable unwanted Software.

  5. Update Your System: Keeping your operating system and drivers up to date not only enhances performance but also improves security against vulnerabilities that threats might exploit.

While my issue is resolved, I encourage anyone experiencing similar symptoms to take prompt action. Being proactive about your system’s security can prevent future occurrences of this kind. If you’ve had similar experiences and found solutions, feel free to share your insights in the comments!

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *