F5F Stay Refreshed Software Operating Systems Yes, mining software can be designed to avoid detection by the task manager.

Yes, mining software can be designed to avoid detection by the task manager.

Yes, mining software can be designed to avoid detection by the task manager.

C
ChloeET
Senior Member
736
03-25-2025, 11:38 PM
#1
title.
C
ChloeET
03-25-2025, 11:38 PM #1

title.

S
Slick_Kat
Member
69
03-29-2025, 10:13 PM
#2
Yes, it functions similarly to any other software.
S
Slick_Kat
03-29-2025, 10:13 PM #2

Yes, it functions similarly to any other software.

C
CrazyBessyCat
Posting Freak
912
03-30-2025, 10:06 PM
#3
Sure, you can check for unlisted CPU/GPU usage by using system tools like Task Manager, Resource Monitor, or third-party software such as HWMonitor or Speccy. These provide detailed insights beyond what's shown in the Task Manager.
C
CrazyBessyCat
03-30-2025, 10:06 PM #3

Sure, you can check for unlisted CPU/GPU usage by using system tools like Task Manager, Resource Monitor, or third-party software such as HWMonitor or Speccy. These provide detailed insights beyond what's shown in the Task Manager.

D
133
04-14-2025, 09:48 AM
#4
Also see how it works.
D
DragonChaser35
04-14-2025, 09:48 AM #4

Also see how it works.

P
Poop_Head27
Posting Freak
820
04-18-2025, 10:50 PM
#5
View by process remains within Task Manager. Therefore, no, "any application" cannot conceal itself from it.
P
Poop_Head27
04-18-2025, 10:50 PM #5

View by process remains within Task Manager. Therefore, no, "any application" cannot conceal itself from it.

M
Mr5tyak
Junior Member
13
04-20-2025, 02:24 PM
#6
Rootkits can evade detection in Task Manager. Search for a tool named "Process Explorer." If you suspect malware, consider using Malwarebytes, ComboFix, SuperAntispyware, or similar solutions to identify and eliminate threats.
M
Mr5tyak
04-20-2025, 02:24 PM #6

Rootkits can evade detection in Task Manager. Search for a tool named "Process Explorer." If you suspect malware, consider using Malwarebytes, ComboFix, SuperAntispyware, or similar solutions to identify and eliminate threats.