Warning: If you see a PowerShell window repeatedly showing “Running the environment check. Please wait… License OK,” your PC is very likely infected with malware. This behavior isn’t a normal Windows message — it’s a malicious process disguising itself as a system operation.
This guide helps you understand what’s happening, how the malware affects your system, and how to remove it safely.
Quick Threat Summary – “Running the environment check. Please wait… License OK” Malware
| Threat Name | “Running the environment check. Please wait… License OK” malware |
|---|---|
| Type | Trojan / Hidden background malware |
| Symptoms | PowerShell window opens repeatedly with environment check message |
| How It Spreads | Fake installers, cracked apps, untrusted downloads, bundled software |
| What It Does | Runs hidden scripts, creates persistence, potentially steals data |
| Primary Risk | Unauthorized access, credential theft, additional malware |
| Fix Tools | Full malware scan & removal tools, system cleanup |
What the “Running the environment check” Malware Actually Means
This message is not a legitimate Windows function. Malware authors use familiar command‑line output to mask their activity and delay detection. When this malware runs, it performs hidden system checks and quietly starts other malicious modules.
Common behaviors include:
- Launching scripts in the background without user action
- Creating registry autoruns and scheduled tasks so it restarts automatically
- Downloading additional harmful components
- Collecting system and user information
- Keeping a foothold on your PC even after reboots
Seeing this message is a sign of active infection — not a harmless pop‑up. You need to treat it as malware and remove it promptly.
How This Malware Likely Got on Your PC
People typically encounter this issue after:
Downloading software from sketchy sites
Pirated or cracked programs often bundle hidden malware that runs immediately.
Running fake activators or license tools
Malware masquerades as keygens or license updaters and executes unseen scripts.
Clicking on deceptive ads or links
Malicious downloads can trigger PowerShell processes that display benign‑looking messages to hide their true intent.
The malware plays on the familiarity of system messages so you won’t recognize anything is wrong.
Why You Should Fix It Immediately
This isn’t just annoying — it’s harmful. If left alone:
- Your credentials or passwords could be harvested
- Your PC might communicate with remote hackers
- More malware (like backdoors or ransomware) can install
- Your system stability and performance can degrade
This environment check process is visible, but the real malware runs in the background.
Step‑by‑Step Malware Cleanup
Here’s how to remove it safely and completely:
1. Disconnect from the Internet
Immediately turn off Wi‑Fi or unplug Ethernet. This prevents the malware from sending data or downloading more harmful files.
2. Run a Deep Malware Scan
Use a reliable antimalware tool and perform a full system scan. Quick scans often miss persistent threats.
Make sure your malware definitions are fully updated before scanning.
3. Look for Unauthorized Startup Entries
Malware often adds itself to system startup:
- Open Task Manager → Startup
- Disable anything unfamiliar or suspicious
If you don’t recognize it, research it before deleting.
4. Check Scheduled Tasks
Some malware will re‑launch itself via Windows Task Scheduler:
- Open Task Scheduler
- Look for tasks that run PowerShell or strange executables
- Delete anything that wasn’t put there by you
5. Clean Hidden Persistence in Registry
Malicious autoruns can live in the Windows registry:
- Run regedit
- Check these keys:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run - Remove dubious entries carefully
⚠️ Only delete entries you are certain are malicious — wrong edits can break Windows.
6. Remove Unknown Files & Folders
Search in:
- %APPDATA%
- %LOCALAPPDATA%
- Program Files
Look for folders created recently or with odd names. Remove only confirmed malicious files.
7. Change Passwords After Cleanup
Once the malware is gone, change login credentials for your accounts — especially if you used the PC for email or financial services.
Common Questions From Users
❓ Is this a Windows update?
No. Legitimate updates don’t show PowerShell environment checks like this.
❓ Can this malware steal passwords?
Yes — it can access data and send it to attackers if left active.
❓ Does closing the window remove it?
No — the malware continues running behind the scenes.
Final Security Tips
To avoid similar infections:
- Only download software from official sites
- Avoid cracked or pirated installers
- Use reputable antivirus and keep it updated
- Be cautious with attachments and download links
Manual Trojan Malware Removal Guide
Step 1: Boot into Safe Mode
- Restart your computer.
- Before Windows starts, press the F8 key (or Shift + F8 on some systems).
- Select Safe Mode with Networking from the Advanced Boot Options menu.
- Press Enter to boot.
This prevents the Trojan from running and makes it easier to remove.
Step 2: Identify and Stop Malicious Processes
- Press Ctrl + Shift + Esc to open Task Manager.
- Go to the Processes tab (or Details in Windows 10/11).
- Look for suspicious processes using high CPU or memory, or with unfamiliar names.
- Right-click on the suspicious process and select Open File Location.
- If the file is in a temporary or system folder and looks unfamiliar, it is likely malicious.
- Right-click the process and choose End Task.
- Delete the associated file in File Explorer.
Step 3: Remove Trojan-Related Files and Folders
- Press Win + R, type %temp%, and press Enter.
- Delete all files in the Temp folder.
- Also check these directories for unfamiliar or recently created files:
- C:\Users\YourUser\AppData\Local\Temp
- C:\Windows\Temp
- C:\Program Files (x86)
- C:\ProgramData
- C:\Users\YourUser\AppData\Roaming
- Delete suspicious files or folders.
Step 4: Clean Trojan Malware from Registry
- Press Win + R, type regedit, and press Enter.
- Navigate to the following paths:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Look for entries launching files from suspicious locations.
- Right-click and delete any entries you don’t recognize.
Warning: Editing the registry can harm your system if done improperly. Proceed with caution.
Step 5: Reset Browser Settings
Google Chrome
- Go to Settings > Reset Settings.
- Click Restore settings to their original defaults and confirm.
Mozilla Firefox
- Go to Help > More Troubleshooting Information.
- Click Refresh Firefox.
Microsoft Edge
- Go to Settings > Reset settings.
- Click Restore settings to their default values.
Step 6: Run a Full Windows Defender Scan
- Open Windows Security via Settings > Update & Security.
- Click Virus & threat protection.
- Choose Scan options, select Full scan, and click Scan now.
Step 7: Update Windows and Installed Software
- Press Win + I, go to Update & Security > Windows Update.
- Click Check for updates and install all available updates.
Automatic Trojan Removal Using SpyHunter
If manually removing the Trojan seems difficult or time-consuming, using SpyHunter is the recommended method. SpyHunter is an advanced anti-malware tool that detects and eliminates Trojan infections effectively.
Step 1: Download SpyHunter
Use the following official link to download SpyHunter: Download SpyHunter
For full instructions on how to install, follow this page: Official SpyHunter Download Instructions
Step 2: Install SpyHunter
- Locate the SpyHunter-Installer.exe file in your Downloads folder.
- Double-click the installer to begin setup.
- Follow the on-screen prompts to complete the installation.
Step 3: Scan Your System
- Open SpyHunter.
- Click Start Scan Now.
- Let the program detect all threats, including Trojan components.
Step 4: Remove Detected Malware
- After the scan, click Fix Threats.
- SpyHunter will automatically quarantine and remove all identified malicious components.
Step 5: Restart Your Computer
Restart your system to ensure all changes take effect and the threat is completely removed.
Tips to Prevent Future Trojan Infections
- Avoid downloading pirated software or opening unknown email attachments.
- Only visit trusted websites and avoid clicking on suspicious ads or pop-ups.
- Use a real-time antivirus solution like SpyHunter for ongoing protection.
- Keep your operating system, browsers, and software up to date.
