This page aims to help you remove JS:Miner – AA Coinhive Virus. Our removal instructions work for every version of Windows.
You’ve surely already heard about the infamous and highly dangerous category of malware viruses called Trojan Horses. Those nasty threats can harm your computer system in numerous ways and they could also be used by their creators for a number of other nasty cyber crimes such as personal data theft and distribution of other insidious and illegal programs (Ransomware, Spyware, etc.). Recently, there have been reports about the release of yet another addition to the family of Trojan Horse viruses, a nasty malware program that goes under the name of JS:Miner – AA. It is this particular virus that we will be focusing on throughout the next lines in attempts to help our readers keep their computers safe from it. However, since we understand that a lot of the visitors to this page might have actually come here seeking help with removing JS:Miner – AA from their machines, we have also made sure to present them with two reliable methods for handling the infection. The first method we can offer is a removal guide with instructions that will show you how to manually eliminate the threat from your PC without the need to contact a specialist and bring your PC to them. The other option for dealing with JS:Miner – AA available on this page is a removal tool that you can download and use to detect the malware on your PC and remove it. You can use either of the methods but we advise you to actually try both of them and see what works best for you. Just make sure that you take the necessary precautions and remove the insidious cyber threat before it has managed to carry out its nasty task as there could really be all kinds of unpleasant and unforeseen consequences if you allow the infection to remain inside your computer for any extended period of time.
JS:Miner – AA Virus Removal
If you have a Windows virus, continue with the guide below.
If you have a Mac virus, please use our How to remove Ads on Mac guide.
If you have an Android virus, please use our Android Malware Removal guide.
If you have an iPhone virus, please use our iPhone Virus Removal guide
Some of the steps will likely require you to exit the page. Bookmark it for later reference.
Reboot in Safe Mode (use this guide if you don’t know how to do it).
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous.
Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:
After you open their folder, end the processes that are infected, then delete their folders.
Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.
Hold together the Start Key and R. Type appwiz.cpl –> OK.
You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.
Type msconfig in the search field and hit enter. A window will pop-up:
Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.
- Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click Properties.
- The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
- Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.
- After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.
Right click on the browser’s shortcut —> Properties.
NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).
Properties —–> Shortcut. In Target, remove everything after .exe.
Remove JS:Miner – AA from Internet Explorer:
Open IE, click —–> Manage Add-ons.
Find the threat —> Disable. Go to —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.
Remove JS:Miner – AA from Firefox:
Open Firefox, click ——-> Add-ons —-> Extensions.
Remove JS:Miner – AA from Chrome:
Close Chrome. Navigate to:
C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:
Rename it to Backup Default. Restart Chrome.
Type Regedit in the windows search field and press Enter.
Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:
- HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random
What you must know about the Trojan Horse category
Similarly to other representatives of this malware family, JS:Miner – AA is a very stealthy and tricky to detect piece of malware that should not be underestimated. Normally, such viruses are programmed in a way that would make them give as few infection symptoms as possible. In certain cases, there might be no indications whatsoever that there has been an infection and the user might have no idea that their computer has been infiltrated by a nasty and harmful Trojan even after the damage has been done to their system. Of course, this is not to say you shouldn’t be vigilant and watchful – if you are lucky and the virus triggers some red flags that might give away its presence, you must notice that and act accordingly. Possible red flags are increased HDD memory and RAM use as well as increased use of your GPU and CPU. Random freezes, errors and BSOD (Blue Screen of Death) crashes are also some symptoms that might indicate a Trojan Horse infection. Other similar disturbances could also be caused by such a virus. The bottom line is – you need to be on the lookout for any irregularities so that you would at least stand a chance at spotting and intercepting a malware such as JS:Miner – AA on time. Remember that a good and fully updated antivirus program could also help you with that so you may want to get one in case you currently don’t have such a program.
One other important factor you ought to remember about Trojans is that they use many different forms of distribution where the virus is usually disguised as something that doesn’t look dangerous. It might be a file attachment to some spam message or a misleading online advert. It could also be some software download from a questionable developer/distributor, a torrent file, a redirect link as well as many other similar pieces of content. Being careful at all times while you are on the Internet is usually the only relatively reliable way of staying safe and keeping nasty viruses like JS:Miner – AA away from your PC.
The problems that a Trojan could cause
In the intro of this article we already mentioned that such viruses could have many different purposes. Some might be used for harming your system and/or corrupting your valuable data, others might be employed as backdoors for Ransomware and other nasty forms of malware. In many cases, a Trojan would try to take over the user’s PC and turn it into another member of its botnet so it could later use it for spam campaigns, cryptomining, DDoS attacks and other shady activities. Many other possibilities are available and all of them can be really harmful for you and your machine. Therefore, make sure that if JS:Miner – AA has indeed managed to infiltrate your machine you take care of this issue ASAP and remove the infection before it’s too late.
|Name||JS:Miner – AA|
|Danger Level||High (Trojans are often used as a backdoor for Ransomware)|
|Symptoms||Trojans normally show no symptoms, yet you might still spot a Trojan infection if your computer starts behaving oddly (high use of RAM, CPU and GPU, frequent errors, crashes, etc.).|
|Distribution Method||Most Trojans are distributed through spam campaigns, malvertising and through illegally distributed software downloads.|
Some threats reinstall themselves if you don't delete their core files. We recommend downloading SpyHunter to remove harmful programs for you. This may save you hours and ensure you don't harm your system by deleting the wrong files.
If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!