“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

This page aims to help you remove Pua.jscoinminer Trojan Virus. Our removal instructions work for every version of Windows.

If you are looking for more info about Pua.jscoinminer, stay with us. Our “How to remove” team has dedicated this entire article on this particular Trojan horse, and we hope that the details and the instructions you will find here will be useful. Whether you have been infected with this virus or you are simply looking for more information, here we will cover the most probable sources of the infection, the possible problems it may cause and the most effective methods to have it removed. Make sure you carefully read everything in order not to miss anything important.

What is Pua.jscoinminer?

Pua.jscoinminer is a newly discovered infection. Security experts classify it as a Trojan horse, which could be exploited for a number of criminal tasks. If your system has been infected with it, you should know that your entire machine is put in great danger. Trojans are famous for their dreadfully harmful abilities, some of which include breaking into your computer in a stealthy way, often times in a combo with Ransomware or some other virus. Usually, this type of malware operates in such a way, that it tries to mislead you about its real nature and intentions. It may often appear like a harmless, or even useful program, document, funny image, link, email message or attachment, etc. and trick you into clicking or installing it, believing that you are getting some free or useful feature. Its true evil nature may be revealed weeks or months after the contamination when the threat activates and performs the specific criminal task it has been programmed for.

Pua.jscoinminer could be distributed via:

Unfortunately, we cannot name a concrete location where Trojans lurk. An infection like this can be hidden in literally anything and everything. To infiltrate your computer, the hackers usually mask the malware as an email attachment, a harmless looking file, an interesting ad, a free download link, a torrent or even a fake system update message. That’s why it is of the utmost importance to use your common sense when interacting with online content and never take every interesting offer, pop-up or email at face value. It is best if you stick to trusted content and have reputed antivirus software on your system. 

Pua.jscoinminer Trojan Virus Removal


“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/

Scan Results

Virus Scanner Result
“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)ClamAV
“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)AVG AV
“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)Maldet

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Hold together the Start Key and R. Type appwiz.cpl –> OK.

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Type msconfig in the search field and hit enter. A window will pop-up:

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

If there are suspicious IPs below “Localhost” – write to us in the comments.

“Pua.jscoinminer Symantec Security Risk” Removal (Sept. 2018 Update)

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide didn’t help you, download the anti-virus program we recommended or ask us in the comments for guidance!

What can you expect from a Trojan like Pua.jscoinminer?

Normally, the hackers use threats like Pua.jscoinminer for a long list of criminal purposes. Each Trojan can be programmed with a different “mission” and, unfortunately, we cannot describe in detail all the possible uses the criminals may decide to use their malware for. However, here are some of the most common harmful deeds we can accuse a Trojan horse like Pua.jscoinminer in:

  • Theft of data and credentials: stealing sensitive information is the specialty of any Trojan. From your social media accounts, login credentials and passwords to your banking details, confidential work details and keystrokes – they all can be secretly copied and transferred to the cybercriminals.
  • Destruction and malfunction of the system: A threat like Pua.jscoinminer can be effectively used to corrupt certain files or software found on your machine or totally destroy the entire OS, this way making the computer completely unusable.
  • In some cases, the Trojan may serve the purpose of manipulating the settings of your device and causing malfunction, sudden crashes, and unusual system errors. This could be just a sick way for the hackers to play around with the nerves of their victim while entertaining themselves or simply practicing their programming skills. 
  • Exploiting your PC resources: With the help of a Trojan, the hackers may turn your PC into a bot and gain complete control over all of its resources. If this happens, your machine may unknowingly get involved in spam distribution, cryptocurrency mining and various others criminal deeds.
  • Insertion of Ransomware or some other virus into your system: If a Trojan like Pua.jscoinminer has managed to get inside your system, you should better be cautious about the possible contamination with other viruses as well. Very regularly, security experts witness a scenario where the Trojan horse comes in a combo with a Ransomware virus or some other nasty infection and secretly inserts it into the system. This is probably one of the worst things that could happen. That’s why we strongly advise all our readers to remove infections like this immediately and not let them stay on the system even a minute more. The instructions in the Removal Guide below are at the disposal of anyone who needs them and wants to get rid of this Trojan.


Name Pua.jscoinminer
Type Trojan
Danger Level High (Trojans are often used as a backdoor for Ransomware)
Symptoms Usually, there are no symptoms that could give this threat away.
Distribution Method The hackers usually mask the malware as an email attachment, a harmless looking file, an interesting ad, a free download link, a torrent or even a fake system update message.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.


About the author


Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

Leave a Comment