Ethdcrminer64.exe Ethereum Miner Virus - How to Detect and Remove It

Ethdcrminer64.exe Ethereum Miner Virus – How to Detect and Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created in order to help explain what is the purpose of Ethdcrminer64.exe process and how to fully remove it from your computer plus how to restore it back to normal working state.

A new cryptocurrency miner malware has been detected to take advantage of the computers infected by it in order to install Claymore`s Dual Ethereum miner – a software for mining Ethereum, Decred, Siacoin, Lbry, Pascal and other altcoin cryptocurrencies. The malware runs via a process, named ethdcrminer64.exe which is likely to run on 64-bit architecture and having this process on your computer means that your GPU is likely to be ovehreating and your computer’s performance may slow down significantly. What is even more dangerous is that your PC may even malfunction as a result of this malware staying on it for longer periods of time.

Threat Summary

Nameethcrminer64.exe Miner Malware
TypeCryptoCurrency Miner
Short DescriptionAims to infect your computer and use it’s CPU, GPU and other resources to turn it into a miner for cryptocurrencies.
SymptomsHightened CPU and GPU usage and overheating. The victim PC may break if this virus mines for longer periods of time.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by ethcrminer64.exe Miner Malware


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss ethcrminer64.exe Miner Malware.

Ethdcrminer64.exe Miner Virus – Infection Methods

In order to infect computers, the Ethdcrminer64.exe miner malware may arrive on them via a variety of ways, including pretending to be legitimate software, such as:

  • An executable that aims to pretend that it is a setup of a legitimate program.
  • A fake software license activator.
  • Fake game patch, crack or key generator.

In addition to this, the Ethdcrminer64.exe may also come as a fake e-mail attachment whose primary purpose is to deceive victims into downloading and opening a malicious e-mail attachment, while they believe it is a legitimate one. This may immediately result in multiple different types of activities such as the malware connecting to a remote host and eventually downloading it’s payload, which contains a modified version of the Claymore’s Dual Ethereum GPU Miner, that runs silently in the background. The e-mails may contain deceptive messages within them and their primary goal is to trick the victim into opening the e-mail attachments that are embedded within them. They may appear similarly to the example image below:

Ethdcrminer64.exe Trojan – Malicious Activity

Since the program used by the malware may be v10.3 of Claymore’s Dual Ethereum miner, it may also mine for the following cryptocurrencies, using your PC’s resources:

  • Decred
  • Siacoin
  • Lbry
  • Pascal

The version may include bug fixes and improvements and a clear symptom of having the software on your computer is that it runs in the background and can be spotted on Windows Task Manager as an active executable without a user:

When active, the ethdcrminer64.exe process may take up to 100% of your computer’s resources in order to work. But it’s primary target is the GPU of your computer which cannot be detected via Task Manager. So you can either download GPU temperature tracking software to see if your GPU is overheating or simply see if your cooling fans are running on 100% to try to cope with the high temperature that the mining process generates.

The main activity of ethdcrminer64.exe is to connect your computer to a so-called mining pool and from there to begin to mine for one of various cryptocurrencies. Since the cyber-criminal who is behind this miner malware, utilizing Claymore’s legitimate mining tool may have infected other computers as well all of the infections may lead to his wallet and the more computers are infected, the more tokens are generated for the cyber-crook. In addition to this, it is extremely dangerous if this miner remains for longer periods on your computer, because it may damage the internal components, so it’s removal is strongly advisable.

Another important reason why you should remove the ethdcrminer64.exe malware as fast as possible is that since it is malware after all, it may also have Trojan Horse capabilities. This means that the ethdcrminer64.exe virus may be able to:

  • Log your keystrokes, using a keylogging software.
  • Steal files directly from your computer system.
  • Obtain various different types of passwords and logins from your PC.
  • Take screenshots on your computer.

Ethdcrminer64.exe – Detection and Removal Instructions

In order to detect this miner malware on your PC, all you have to do is see it’s process running on your Windows Task Manager, or if the malware has somehow managed to hide the process to use third-party process tracking program, like Process Explorer which displays all processes on your PC with detailed information.

If you detect ethdcrminer64.exe running in the background of your computer system, recommendations are to focus on following the removal instructions down below. They are specifically designed to allow you to fully erase any traces of ethdcrminer64.exe malware on your computer. However, for maximum effectiveness and since this malware may create various files that are unwanted plus it may copy itself multiple times to prevent manual removal, a more automatic approach is required. Malware researchers and security experts often recommend using an advanced anti-malware software to fully erase any activity and objects created by ethdcrminer64.exe on your computer plus protect your computer against any future threats as well.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

1 Comment

  1. AvatarSuperWaffleKitty

    you do realize this may be misleading since people intentionally download that program on their own computers to mine crypto-currency for themselves.


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share