About
MinerSearch is a utility for detecting suspicious files, processes, services and other artifacts associated with hidden cryptocurrency miners.
The utility scans the system, suspends malicious processes, moves files to quarantine and generates detailed reports. Console mode and command-line parameters are supported.
-
Process Scanning
Search for suspicious processes by signatures, ports and behavior
-
Registry Check
Analysis of startup files, unwanted settings, and suspicious entries in the system registry.
-
WMI and Services
Check WMI integrity and suspicious Windows services
-
Task Scheduler
Analysis of the task scheduler and malware persistence mechanisms. Analysis in Windows Safe Mode is supported.
-
Logging
Detailed reports on each scanning stage and found threats
-
Advanced Scanning Options
Wide range of launch parameters for precise scanning configuration
Usage
- Download the latest version from GitHub Releases and extract the archive into a separate folder.
- Run application as administrator. On first launch, program offers to send scan results – this is optional.
- Wait for scanning completion. After that, a form opens with brief report on eliminated threats.
- Click "Open Report" to view detailed report or "Quarantine" to manage quarantine.
To change the language, create a file
language.cfg
in the program folder and specify
RU
or
EN.