High Firewall cpu

I’ve been trying to figure out why I have a slow wifi network, I’ve been getting about 60 mbit. I’ve tried filecopy from a gigabit connected machine to with routeros(RB800@1066, 52n) wifi, netgear 3700 wifi and gigabit connection. I get great linkspeed, 300 on both but really different speeds. The netgear I can pull/push at about 200 mbit with windows file copy, on gigabit connection I get close to full gigabit speed. But on the rb800 I still get poor results, 60mbit.

So today I fiddled a bit with settings, removed WMM and also started the profiler. this seemed to give me about 120 mbit all of a sudden, no clue why since wmm should as I figure not have a impact for single connections, one session. But When I started the profiler the firewall was pedling between 6-13%. How can this be, wifi and eth2 is bridged and I would figure it not to go to the fw.

Flags: X - disabled, I - inactive, D - dynamic 
 #    INTERFACE                                    BRIDGE                                    PRIORITY  PATH-COST    HORIZON
 0    ether1                                       bridge1                                       0x80         10       none
 1    wlan1                                        bridge1                                       0x80         10       none
 2 I  ether2                                       bridge1                                       0x80         10       none



[admin@MikroTik] > ip
[admin@MikroTik] /ip> firewall filter 
[admin@MikroTik] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic 
 0   ;;; Accept established connections
     chain=input action=accept connection-state=established 

 1   ;;; Accept related connections
     chain=input action=accept connection-state=related 

 2   ;;; Drop invalid connections
     chain=input action=drop connection-state=invalid 

 3   ;;; UDP
     chain=input action=accept protocol=udp 

 4   ;;; Allow limited pings
     chain=input action=accept protocol=icmp limit=50/5s,2 

 5   ;;; Drop excess pings
     chain=input action=drop protocol=icmp 

 6   ;;; From our LAN
     chain=input action=accept src-address=192.168.12.0/24 in-interface=bridge1 

 7   ;;; PPTP server accept
     chain=input action=accept protocol=tcp dst-port=1723 

 8   ;;; PPTP GRE 47 accept
     chain=input action=accept protocol=gre 

 9   chain=forward action=drop src-address=0.0.0.0/8 

10   chain=forward action=drop dst-address=0.0.0.0/8 

11   chain=forward action=drop src-address=127.0.0.0/8 

12   chain=forward action=drop dst-address=127.0.0.0/8 

13   chain=forward action=drop src-address=224.0.0.0/3 

14   chain=input action=drop dst-address=224.0.0.0/3 

15   ;;; drop ftp brute forcers
     chain=input action=drop protocol=tcp src-address-list=ftp_blacklist dst-port=21 

16   chain=output action=accept protocol=tcp content=530 Login incorrect dst-limit=1/1m,9,dst-address/1m 

17   chain=output action=add-dst-to-address-list protocol=tcp address-list=ftp_blacklist address-list-timeout=3h 
     content=530 Login incorrect 

18   ;;; drop ssh brute forcers
     chain=input action=drop protocol=tcp src-address-list=ssh_blacklist dst-port=22 

19   chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage3 
     address-list=ssh_blacklist address-list-timeout=1w3d dst-port=22 

20   chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage2 
     address-list=ssh_stage3 address-list-timeout=1m dst-port=22 

21   chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage1 
     address-list=ssh_stage2 address-list-timeout=1m dst-port=22 

22   chain=input action=add-src-to-address-list connection-state=new protocol=tcp address-list=ssh_stage1 
     address-list-timeout=1m dst-port=22 

23 I ;;; PPTP client access
     chain=input action=accept in-interface=pptp-in1 

24 I ;;; PPTP client access
     chain=input action=accept in-interface=pptp-in2 

25 I ;;; PPTP client access
     chain=input action=accept in-interface=pptp-in3 

26   ;;; Log everything else
     chain=input action=log log-prefix="DROP INPUT" 

27   ;;; Worm Virus
     chain=forward action=drop protocol=tcp src-address-list=Worm-Infected-p445 dst-port=445 

28   ;;; Drop everything else
     chain=input action=drop 

[admin@MikroTik] /ip firewall filter>