How to Find and Remove a Hidden Miner Virus on Your PC - Artex (2023)

Often, some people build their income on not entirely honest schemes. With the development of technical progress, carrying out such activities is improving, and new ones are appearing. With the advent of computers, the global expansion of computer networks, and the emergence of a whole virtual world with its currencies, it became possible to steal virtual computing resources from unprotected users.

In the previous article, our central crypto-enthusiast Alex told us about hidden mining and its dangers. This article will learn how to properly check your PC for such viruses-mainers and remove them in time without consequences for your equipment.

  1. How to Check Computer for Hidden Mining
  2. How to Detect a Mining Virus
  3. How to Protect My PC From Hidden Mining
  4. Programs to Remove Mining Viruses
  5. Browser Mining Protection
  6. Google Protection
  7. What Next

To check your computer for hidden mining, you can run Windows Task Manager (by pressing Ctrl+Alt+Del and activating Task Manager) or another program that allows you to monitor the CPU, GPU, memory, disk space, network activity and what processes are running on the system.

(Video) find social media accounts with Sherlock (in 5 MIN)

You should pay attention to processes that are consuming too many resources. A more detailed study of these processes, in which folder they are located, how they are started, what network addresses they connect to, allows you to determine their reliability. It is convenient to use Process Monitor utility for this purpose.

In addition, you should check the list of programs in the computer autoloader and carefully check which programs are automatically loaded on the computer when it is switched on. This is best done using the Autoruns program.

You should check your computer’s firewall to see if certain programs are allowed to have network activity. If some program has an obscure name and has full access to the network, you should examine it in more detail by searching for information about it on the network and, if necessary, delete it or prohibit it from accessing the Internet.

If you use the regular Windows firewall, you can see and adjust the permissions of programs to access the network through its menu of additional parameters. This will also allow you to find out who is mining from your computer. Knowing how to detect hidden mining programs will allow you to remove them and safely use your equipment.


How to Detect a Mining Virus

The very first thing an illegal program should detect is antivirus. But, when a hacker uses advanced programs that automatically perform training and add the miner to the list of trusted programs, this may not work.

Checking your computer for a mining virus can be more reliable if you boot the operating system from a different, clean media and run a good antivirus with updated databases in a known clean environment. It is advisable to perform this procedure periodically, even if you are sure that there are no mining programs, to search for Trojans and spyware modules on your computer.

The presence of hidden programs that use the computer for mining can be determined by a number of characteristic signs. They are not necessarily indicative of the presence of a hidden miner, but by the combination of signs will help you better understand if everything is okay with your computer:

  • The increased load on the computer when mining causes a strong slowdown of its work, increased time of opening pages on the Internet, slowness of games and delays when watching video files.
  • Computer equipment begins to consume significantly more electricity, gets hotter, and its cooling system is constantly running at maximum capacity.
  • A large amount of storage space is missing, from several gigabytes and up, and the hard drive access LED is showing constant activity.
  • The computer is constantly exchanging data with the Internet, even if no one is using it. The computer’s own drain of traffic is circumstantial evidence pointing to hidden mining.
  • During a computer boot, windows of incomprehensible programs briefly appear, which disappear very quickly.
  • These signs may indicate the need to reinstall the operating system or wear and tear on the hardware and are often signs of viruses, including hidden mining programs. In order to prevent cryptojackers from getting on your computer, you need to know how to protect yourself from hidden mining.

If you suspect that there are mining programs on your computer, you should perform a number of simple operations. To protect against viruses, including hidden mining programs, you need to do the following:

(Video) Unlimited Free Games in Steam

  • Be sure to install a good antivirus on your computer and regularly update its antivirus database and scan for possible threats.
  • Have an image of a clean, tested operating system with the most necessary programs installed and restore it when the first signs of infection appear, or, better yet, regularly once every 2-3 months as a preventive measure.
  • Include in the hosts file a blocking of malicious sites according to the lists available on the open resource GitHub, according to the algorithm described in the protection against browser mining.
  • Allow only verified programs to run. To do this, modify the local security policy by running the Secpol MSC program, where you create a restricted programs policy, in the properties of which you activate the rules regarding restricted use of all files (except libraries), and activate the option to ignore certificate rules.
  • Allow access to the computer only to the allowed ports. This is done in the firewall and antivirus settings.
  • Prohibit remote Internet access to the home router and change the default password set on it (according to its user manual).
  • If these actions will not get rid of the virus, then restrict its access to the Internet so that it does not consume the resources of your computer.

Programs to Remove Mining Viruses

To remove mining viruses, you can use a good antivirus program, which before using it, you must update the database. Norton Antivirus, Kaspersky antivirus and others show good results when protecting against mining by hackers. For any security-conscious user, using an anti-virus against hidden mining should be the norm.

Protecting your computer from hidden miners requires some knowledge from the user and constant monitoring of new tools that hackers use to do so. The main thing is to use preventive measures, which consist of following security measures when surfing the Internet and using pirated software.

Browser Mining Protection

Significant signs of browser mining is the slowing of the computer on some sites, high CPU load when viewing certain sites, especially when viewing sites with movies, pirated programs, semi-legal photos. The following methods are used to protect against mining in the browser:

  • Blocking malicious sites used for hidden mining in the hosts service file.
  • Using anti-mining software that also removes mining viruses. To this end, you can use a variety of utilities, for example, the program for removing hidden mining Anti-WebMiner gives good results.
  • Using filters in uBlock, AdBlock and similar apps.

Google Protection

To combat hidden mining, the Google Play store has banned the placement of programs that perform mining on its site since July 2018. Google’s Chrome browser allows you to protect yourself against mining in the browser by using add-ons.

(Video) What your favorite Fandom says about you!

By activating “Protect your device from dangerous sites” and in the advanced settings menu “Find and remove malware.” To detect mining when the Chrome browser is open, you should also press Shift+ESC and analyze which processes consume the most resources.

What Next

Many scammers use someone else’s processing power to mine cryptocurrencies. The main thing is to detect hidden mining on your computer and remove it. The Artex Global team hopes that this article helped you to solve your problem. Follow our articles and explore the world of cryptocurrencies and mining with us. If you missed our previous articles, we advise you to study them, so you don’t miss important information, for example, Poloniex cryptocurrency exchange review or Indacoin cryptocurrency exchange review.

How to Find and Remove a Hidden Miner Virus on Your PC - Artex (1)

(Video) Google HACKING (use google search to HACK!)


I have been studying cryptocurrency for over 5 years. I have accounts in every exchange and I test everything on myself.
I want this market to be more understandable for everyone.


How do I get rid of hidden Miner virus on my computer? ›

How to Find and Remove a Hidden Miner Virus on Your PC 🛡️🖥️

How do you detect a miner? ›

Currently, it is possible to detect them using lists of IP addresses from known mining pools, using information from DNS records, or directly performing Deep Packet Inspection (DPI) over all the traffic.

How do you check if there is a miner in your PC? ›

The easiest way is to keep an eye on your CPU usage.
  1. In Windows, right-click the taskbar and select Task Manager. Open the Performance tab.
  2. In MacOS, open Activity Monitor by searching for it with Spotlight (pressing Command + Spacebar) or by going to Applications > Utilities > Activity Monitor.
Feb 16, 2018

How do I get rid of Trojan mining? ›

Click on the Get started button. Click Scan to start a Threat Scan. Click Quarantine to remove the found threats. Reboot the system if prompted to complete the removal process.

What is a miner virus? ›

It's delivered in the form of malicious software (malware) that infects your devices in order to use it for cryptocurrency mining. The target can be any device: computer, smartphone, even cloud servers – the latter is called cloud jacking.

How do you detect cryptojacking? ›

You can run a cryptojacking test by checking the central processing unit (CPU) usage of the device. You can check this by using either the Task Manager or Activity Monitor. However, this might not yield complete results, because processes can hide or mask themselves as something that looks legitimate.

What is Trojan Miner? ›

Trojan. BitCoinMiner identifies a program that either silently installs, or functions as, a specialized mining program (miner) and uses the computer's physical resources (memory, processing power, etc) to generate units of a virtual or digital cryptocurrency.

How do you know if your computer is secretly mining cryptocurrency? ›

4 Ways to Tell if Your Computer is Secretly Mining Cryptocurrency
  1. Mining explained simply. Source: ...
  2. Then why are they enslaving your computer? Source: ...
  3. The performance is slower than usual. ...
  4. The machine is overheating. ...
  5. Electricity bill is higher than usual. ...
  6. You've been visiting suspicious websites.
Jan 15, 2021

How much damage does a miner do? ›

Tower damage58
Hit speed1.2

Is my GPU being mined? ›

GPUs produced specifically for mining have differences in their hardware profile. For instance, a mining GPU may not have any ports to output to a display. This is a clear sign that the GPU is not for gaming. Next, check to see any oddities in the printed circuit board (PCB).

How do you detect Cryptojacking? ›

You can run a cryptojacking test by checking the central processing unit (CPU) usage of the device. You can check this by using either the Task Manager or Activity Monitor. However, this might not yield complete results, because processes can hide or mask themselves as something that looks legitimate.

Can Windows Defender detect Bitcoin miner? ›

Windows Defender detects and removes this threat. This threat can use your PC for Bitcoin mining. This can make your PC run slower than usual.

What is a Bitcoin Miner virus? ›

BitCoinMiner is a generic name of cryptocurrency-mining viruses. On first glance, the name suggests that these viruses mine only Bitcoin cryptocurrency, however, cyber criminals also attempt to mine other cryptocurrencies, such as Monero, Ethereum, etc.

What is Cryptojacking malware? ›

Cryptojacking definition

Cryptojacking is the unauthorized use of someone else's compute resources to mine cryptocurrency. Hackers seek to hijack any kind of systems they can take over—desktops, servers, cloud infrastructure and more—to illicitly mine for crypto coins.


1. how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
2. Do NOT Enter The Temple of Notch in Minecraft Pocket Edition at 3:00 AM
3. Find my device kaise use kare - how to find lost phone | lock stolen phone | mobile ko kaise dhunde
4. Scammers Are Coming For Your Phone Numbers!
(Pleasant Green)
5. How to check who is login my instagram account || secure your instagram account
(Technical Tushar)
6. MAGLabs 2017 - An Introduction to Blockchain, Smart Contracts, and Tokens
Top Articles
Latest Posts
Article information

Author: Arielle Torp

Last Updated: 02/05/2023

Views: 6264

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.