JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 UpdateJS:Miner – AA (Coinhive Virus) Removal Feb. 2019 UpdateJS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update


This page aims to help you remove JS:Miner – AA Coinhive Virus. Our removal instructions work for every version of Windows.

You’ve surely already heard about the infamous and highly dangerous category of malware viruses called Trojan Horses. Those nasty threats can harm your computer system in numerous ways and they could also be used by their creators for a number of other nasty cyber crimes such as personal data theft and distribution of other insidious and illegal programs (Ransomware, Spyware, etc.). Recently, there have been reports about the release of yet another addition to the family of Trojan Horse viruses, a nasty malware program that goes under the name of JS:Miner – AA. It is this particular virus that we will be focusing on throughout the next lines in attempts to help our readers keep their computers safe from it. However, since we understand that a lot of the visitors to this page might have actually come here seeking help with removing JS:Miner – AA from their machines, we have also made sure to present them with two reliable methods for handling the infection. The first method we can offer is a removal guide with instructions that will show you how to manually eliminate the threat from your PC without the need to contact a specialist and bring your PC to them. The other option for dealing with JS:Miner – AA available on this page is a removal tool that you can download and use to detect the malware on your PC and remove it. You can use either of the methods but we advise you to actually try both of them and see what works best for you. Just make sure that you take the necessary precautions and remove the insidious cyber threat before it has managed to carry out its nasty task as there could really be all kinds of unpleasant and unforeseen consequences if you allow the infection to remain inside your computer for any extended period of time.

JS:Miner – AA Virus Removal

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide

JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 

JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update
Drag and Drop File Here To Scan
JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    After you open their folder, end the processes that are infected, then delete their folders. 

    Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Hold together the Start Key and R. Type appwiz.cpl –> OK.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

    Type msconfig in the search field and hit enter. A window will pop-up:

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Hold the Start Key and R –  copy + paste the following and click OK:

    notepad %windir%/system32/Drivers/etc/hosts

    A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    If there are suspicious IPs below “Localhost” – write to us in the comments.

    Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

    1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
    2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
    3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

    Right click on the browser’s shortcut —> Properties.

    NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Properties —–> Shortcut. In Target, remove everything after .exe.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update  Remove JS:Miner – AA from Internet Explorer:

    Open IE, click  JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update —–> Manage Add-ons.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Find the threat —> Disable. Go to JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update Remove JS:Miner – AA from Firefox:

    Open Firefoxclick  JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update  ——-> Add-ons —-> Extensions.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 UpdateRemove JS:Miner – AA from Chrome:

    Close Chrome. Navigate to:

     C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Rename it to Backup Default. Restart Chrome.

    JS:Miner – AA (Coinhive Virus) Removal Feb. 2019 Update

    Type Regedit in the windows search field and press Enter.

    Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

    • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
      HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
      HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

    What you must know about the Trojan Horse category

    Similarly to other representatives of this malware family, JS:Miner – AA is a very stealthy and tricky to detect piece of malware that should not be underestimated. Normally, such viruses are programmed in a way that would make them give as few infection symptoms as possible. In certain cases, there might be no indications whatsoever that there has been an infection and the user might have no idea that their computer has been infiltrated by a nasty and harmful Trojan even after the damage has been done to their system. Of course, this is not to say you shouldn’t be vigilant and watchful – if you are lucky and the virus triggers some red flags that might give away its presence, you must notice that and act accordingly. Possible red flags are increased HDD memory and RAM use as well as increased use of your GPU and CPU. Random freezes, errors and BSOD (Blue Screen of Death) crashes are also some symptoms that might indicate a Trojan Horse infection. Other similar disturbances could also be caused by such a virus. The bottom line is – you need to be on the lookout for any irregularities so that you would at least stand a chance at spotting and intercepting a malware such as JS:Miner – AA on time. Remember that a good and fully updated antivirus program could also help you with that so you may want to get one in case you currently don’t have such a program.

    One other important factor you ought to remember about Trojans is that they use many different forms of distribution where the virus is usually disguised as something that doesn’t look dangerous. It might be a file attachment to some spam message or a misleading online advert. It could also be some software download from a questionable developer/distributor, a torrent file, a redirect link as well as many other similar pieces of content. Being careful at all times while you are on the Internet is usually the only relatively reliable way of staying safe and keeping nasty viruses like JS:Miner – AA away from your PC.

    The problems that a Trojan could cause

    In the intro of this article we already mentioned that such viruses could have many different purposes. Some might be used for harming your system and/or corrupting your valuable data, others might be employed as backdoors for Ransomware and other nasty forms of malware. In many cases, a Trojan would try to take over the user’s PC and turn it into another member of its botnet so it could later use it for spam campaigns, cryptomining, DDoS attacks and other shady activities. Many other possibilities are available and all of them can be really harmful for you and your machine. Therefore, make sure that if JS:Miner – AA has indeed managed to infiltrate your machine you take care of this issue ASAP and remove the infection before it’s too late.


    Name JS:Miner – AA
    Type Trojan
    Danger Level  High (Trojans are often used as a backdoor for Ransomware)
    Symptoms  Trojans normally show no symptoms, yet you might still spot a Trojan infection if your computer starts behaving oddly (high use of RAM, CPU and GPU, frequent errors, crashes, etc.).
    Distribution Method Most Trojans are distributed through spam campaigns, malvertising and through illegally distributed software downloads.
    Detection Tool

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


    About the author


    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    Leave a Comment