JS:MINER [Trj] Miner Virus Family – How to Detect + Remove

JS:MINER [Trj] Miner Virus Family – How to Detect + Remove


with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by JS:MINER and other threats.
Threats such as JS:MINER may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article has been created in order to help explain what is the JS:MINER [Trj] miner malware and how to detect and remove it from your computer system.

A new miner malware, detected to be spread via the web browsers of the victims, using JavaScript has been reported to be existing and spreading and multiple different virus variants. The infection is a Trojan horse, infecting via JavaScript, hence it’s detection name JS:MINER [Trj] by major antivirus companies, like AVG and Avast. In the event that your computer has experienced the JS:MINER malware infection, recommendations are to read this article in order to learn how to fully erase this malware and prevent it from mining cryptocurrencies, like BitCoin or Monero on your computer.

Threat Summary

TypeCryptoCurrency Miner
Short DescriptionAims to mine for various cryptocurrencies on your computer system(one or more), using it’s resources.
SymptomsYour computer is heavily overloaded and you may experience cooling fan noises, system performance slow-downs and interruptions.
Distribution MethodVia malicious software, previously infected your PC, fake setups and malicious executables, disguised as legitimate ones. Macro infections are also a possibility.
Detection Tool See If Your System Has Been Affected by JS:MINER


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss JS:MINER.

JS:MINER Malware – How Does It Spread

In order to infect your computer, the malware primarily uses malicious websites. Such websites may be introduced on your computer as a result of having a Trojan horse or other type of malware or unwanted software previously infected your computer. In addition to this, the JS:MINER malware may also cause an infection by you having to click on a web link believing to be legitimate. Such web links may be concealed in malicious websites as download buttons or sent to you via e-mail, pretending to be legitimate messages with the link, disguised as a “button”, like the malicious e-mail, cleverly disguised as a legitimate Dropbox e-mail:

One particular infection source of this virus is related to the following web link, according to researchers who have reported it on Avast forums via VirusTotal:

JS:MINER Malware – Activity

Once it has infected your computer, the JS:MINER malware may come in several different variants, like:


Those are the variants of the malware that have so far been detected, the most prominent of which is the C version of the malware. When it infects your computer, this miner may also drop payload files directly on your computer, since it is classified as a Trojan Horse infection in general:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%
  • %Windows%

After the files of the virus are already on your computer, the malware may begin to perform different activities that make it run processes as an administrator on your computer and schedule tasks for automatic execution. This may result in various different activities to occur on your computer:

  • It’s CPU usage may increase significantly.
  • Increase in GPU utilization.
  • It may freeze.
  • Significant reduction of its performance.

These are side effects of this virus connecting your computer to a so-called mining pool. Such pools often aim to combine many infected computers by the JS:MINER viruses to the same mining wallet, increasing it’s mining power and hence generating more of the designated cryptocurrency the hackers behind these viruses have created. This results in them generating more cryptocurrency tokens at a smaller time frame as they infect more and more computers in time.

In addition to mining your computer for cryptocurrencies, the JS:MINER malware may also perform other activities on it, such as:

  • Take screenshots of your desktop.
  • Log your keystrokes.
  • Obtain information about BitCoin wallets installed on your computer.
  • Steal passwords and registration ID’s.
  • Steal system information.
  • Steal network information.

Even though it is not known for sure, the malware may do anything to remain hidden on your computer for longer periods of time and this includes updating itself plus downloading other malware or create copies of itself that are on standby in case you delete the original miner file manually. The virus may also perform activities on your computer that may result in JS:MINER mining your computer fileless, in other words by using your web browser without any files that are dropped on your PC.

JS:MINER Virus Family – How to Detect and Remove

In order to detect a JS:MINER virus, it is important that you track the utilization of your CPU and GPU. But, since these viruses are complicated and pretend to not use a significant ammount of your computer’s resources, you should download third-party software, such as CoreTemp and GPUTemp in order to check the actual temperature and usage of your PC’s components, required for mining to take place. If you detect an elevated temperature and usage, reccomendations are to remove JS:MINER from your computer by following the removal instructions down below. They are created in order to help remove JS:MINER either manually or automatically. Furthermore, experts also strongly advise to use an advanced anti-malware software in order to remove JS:MINER, since this will make sure that not only the virus is fully removed but your computer will stay protected against future threats as well.

Note! Your computer system may be affected by JS:MINER and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as JS:MINER.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove JS:MINER follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove JS:MINER files and objects
2. Find files created by JS:MINER on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

1 Comment

  1. Niccolò

    Anche dopoaver formattato ho JC:Miner-AV mi pare e non riesco a toglierlo, potrebbe essere nella rete wifi?


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share