How to remove  (Coinhive virus)

This article will help you to erase from the system. Except that, we will tell you what the aim of such software as Coinhive is and how do diminish its performance. adware

What is Removal reasons and methods is a crypto miner that web developers integrates to the web sites and after that virus infects user's computer. It's a new method when user's browsers works on cyber frauds by producing bitcoins. There is the second way, when virus infects user's with free software downloads. Also, virus shows advertisenet in the browser. In this item we'll explain you how adware works and what’s the difference between trustworthy advertisement and scam that is displayed by is a website that offers a tool for Bitcoin mining that can be embedded to any website. Let’s make it clear for those who don’t know what Bitcoin is. Bitcoin (or BTC) is the most popular and well-known crypto-currency and mining is the process through which any PC owner can create a Bitcoin. This process requires huge computing power and currently, mining of one Bitcoin on home PC takes few years. If you want to learn more about Bitcoin – here is the Wikipedia article about it. We should specify that the developers of such mining software are conditionally not guilty, but they made a potentially dangerous program and placed it for public download, which caused many problems and opened lots of opportunities for online fraudsters. So, what are the issues that users face, when this software gets into their systems? They see suspicious pop-ups with web-addresses like "" and their computers are suffering from significant CPU resource loss. In this case, "" is a subdomain of website and this address will be unique for each webmaster that choose to use this service. The biggest known example of such fraud was Pirate Bay website – one of the largest Torrent-trackers in history. Owners just imbued the Coinhive java-script in the website’s code and considered this as an alternative to common advertising. The main symptom of mining software is the significant slowdown of your computer and your browser, because mining takes a lot of CPU resource.




Unfortunately, we often receive complaints in which users say that mining software appeared on their computers without their consent, and they don’t remember installing anything lately. Most of conversations with tech-support operators begin with one phrase: “There is a program on my computer that I haven’t installed!” How it happens? Scammers use other programs as the bait, and mix these programs in one package with unwanted and dangerous ones. This package is called “bundle” and the method that involves it is called “bundled installation”. Usually scammers use good programs as a bait, but the list of suitable programs is limited. Most often they use browsers, text editors, media players or antiviruses. User wants to install this utility, and during the installation process sees a pop-up window with two installation options: “recommended method” and “method for experienced users”. Scammers always highlight the first way and force users to use it, often just making the second option unavailable. More than a half of users don’t even notice this menu, clicking “OK” and proceeding to the installation, letting unwanted software to enter the system. If you do not remember that you installed, but remember that you installed other toll-free utilities - probably has entered your workstation through this method. As you understand, if Coinhive software got into the system via bundled installation, you already have at least three unwanted programs except bitcoin miner. removal tool

The most effective way to stop annoying ads is to clean your computer from adware. Uninstalling advertising programs is a serious goal which will require you to pay extra attention and certain skills. During the manual removal process, you will need to check the registry, restore the browser settings, eliminate suspicious program from the system, delete the pending objectives for reinstallation of adware and remove and then create new browser shortcuts. For an ordinary user, some items from this list could look very difficult, so we have created a complete instruction. Since we cannot verify the process, we advise you to make a backup of the system before beginning the removal. If you need the most efficient and safe method of removal - Spyhunter can be the thing that you're looking for. The automatic way, unlike manual, demands minimal time from you, while providing much bigger benefit. This anti-virus has lots of pluses, including speed of operation, day-and-night tech-support, low cost and compatibility with other anti-virus programs. If you want to purchase Spyhunter or to learn more about it - simply click the link below.


Special Offer

Download Spyhunter - Anti-malware scanner

We advise downloading SpyHunter to see, if it can detect malware for you.

Spyhunter has a biggest malware database

It protects the system against all kinds of threats: Trojans, adware and hijackers

24/7 Free Support Team

SpyHunter scanner detects threats and malware for free, but to remove infected elements you need to purchase a full version of program for 39.99$. More information about Spyhunter, EULA and Privacy policy. removal instructions

If you use MAC OS, follow our article: MAC adware removal.


One of the easiest ways to block the Coinhive’s activity is the integration of AdBlock Plus application into your browser. This tool fits each popular browser, including Mozilla Firefox, Google Chrome, Internet Explorer and Safari, as well as any Android browser. You just need to install AdBlock Plus and add this filter into it: The significant con of this method is that it allows canceling the installation of miner when you visit the infected website, but cannot help to remove the miner that currently is in the system. To remove Coinhive software from your system – please follow the steps, described below, and do not forget to back up the system before starting the deletion process.



Step 1. Remove from the system

It is an optional step, if you have no installed software with the same name, go to the next step.

Instruction for Windows XP and Windows 7

1. Click Start, click Control Panel, and then double-click Add or Remove Programs.

2. In the Currently installed programs box, click the, and then click Change or Change/Remove.

3. Follow the instructions that appear on the screen to make the changes that you want.

Press Start - Control Panel Choose Program - Uninstall a program Choose needed program and click 'Uninstall'


Instruction for Windows 8

1. Point to the upper-right corner of the screen, move the mouse pointer down, and tap Search.

2. Enter Control panel in the search box, and then click Control Panel.

3. Under View by: select Large Icons, and then click Programs and features.

4. Click the program, and then click Uninstall.

5. Follow the instructions on the screen.


Instruction for Windows 10

1. On the field Search Windows type 'Control Panel'

2. Click Uninstall a program

3. Select and press Uninstall

Type 'Control Panel' in Search field Programs in Control Panel Choose needed program and click 'Uninstall'


Instruction for Mac OS

1. In the Finder sidebar, click Applications

2. Drag the app from the Applications folder to the Trash

3. Choose Finder > Empty Trash

Step 2. Check browser's shortcut

1. Right-click on shortcut

2. Select Properties

3. Check the field Target: there must be only way to your browser, e.g.:

Google Chrome: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"

Mozilla Firefox: "C:\Program Files (x86)\Mozilla Firefox\firefox.exe"

Internet Explorer: "C:\Program Files\Internet Explorer\iexplore.exe"

Opera: "C:\Program Files (x86)\Opera\launcher.exe"

Safari: "C:\Program Files (x86)\Safari\"

Step 3. Remove from browser's settings

Instructions for Google Chrome

1. Launch Google Chrome

2. Click Menu (Customize and control Google Chrome)

3. Select Settings

4. Scroll down and click Show advanced settings...

5. Click Reset settings

How to find Google Chrome Settings How to find Show advanced settings in Google Chrome How to Reset settings in Google Chrome

Instructions for Mozilla Firefox

1. Launch Mozilla Firefox

2. Click on Help on menu bar

3. Select Troubleshooting information

4. Click Reset Firefox...

How to find Mozilla Firefox Troubleshooting information How to launch Reset Firefox... Reset Mozilla Firefox: last step

Instructions for Internet Explorer

1. Launch Internet Explorer

2. Click Tools (You can press ALT+X on the keyboard)

3. Select Internet Options

4. Select Advanced tab

5. Click Reset... button

6. Put the tick near 'Delete personal settings' and click Reset

How to launch Internet Options in Internet Explorer How to find Advanced Internet Options in Internet Explorer How to reset Internet Explorer settings

Instructions for Opera

1. Start Opera

2. Click Menu (Customize and Control Opera)

3. Select Settings > Browser tab

4. Select On Startup - Open a specific page or set of pages - Press button "Set pages" and change Homepage to your favorite one

How to find Extensions in Opera How to disable extensions in Opera How to remove extension from Opera

Instructions for Safari

1. Open Safari browser

2. Click Menu (Display a menu of General Safari Settings)

3. Select Reset Safari...

4. Click Reset

How to display a menu of General Safari settings How to find Reset Safari tab How to reset Safari



Video instruction how to clean browsers




Step 4. Delete elements that would stay after deletion

1. Remove files and folders, if they stayed:

  • Type in the search box
  • Scroll to the bottom of the list of search results. Under Search again in, Click Computer
  • Wait for the search results
  • Delete items found

2. Delete registry keys

  • Click the Start button
  • Type Regedit.exe and press Enter
  • Press Ctrl+F and type ''
  • Click 'Find Next'
  • Delete the entries that were found

Step 5 (Optional). Scan the computer with antimalware scanner

  • Download antivirus tool, e.g. Adwcleaner
  • Press Scan button


AdwCleaner start window


  • Press Clean button


AdwCleaner scan the system


Published by KateRealta



Share your feedback to help other people
1 1 1 1 1 1 1 1 1 1 Rating 5.00 [2 Votes]

Add comment

Security code



Acronis suggestion to CrashPlans users

Around a month ago, there was an accident with CrashPlans backup software.

What is MicTrayDebugger and is it dangerous

This is a brief entry about MicTrayDebugger: what is it, how it appeared in the system, is it dangerous and how to get rid of it.

What is HoeflerText and is it dangerous?


This article is dedicated to the fraud scheme that is called HoeflerText font wasn't found. We will explain you what is this scheme and how to avoid it.

What is Wpad.dat virus and how it is used

The topic of our today's article is a script that had been unjustly called a virus. It’s Wpad.dat, and it is not a virus. We will explain what is Wpad.dat and how to prevent fraudsters to deceive yourself with its help.


Cancer virus trollware

This is an article about crazy Cancer virus and the madness that it brings to victim's computer.

This website uses cookies to improve your experience