I write miners since 2014 and I have some good reputation and earnings in this area, so I don't have any reasons to write viruses and I don't need your coins, I already have enough of them.
You think this is a coincidence - I doubt it.
It already taught me.
I seriously believe it's a coincidence.
He has one of the most popular mining software on the market and about 15 minutes of every day that you run his software it mines for HIM. That's the developer fee. Now multiply that for every mining machine running his software. I think he's set dude. I don't think he needs to bother hacking into your computer to steal your crypto. No offense, but what makes YOU so special that would attract HIM to steal from you? Nobody else on here is accusing him of stealing from him, right? If we all had that in common this place would be blowing up with complaints.
Something to add:
Occam's razer. Your vulnerability is likely the weakest point in your security.
Example: Do you use a VPN when logging onto message boards like this one? If not, this someone might have admin/mod access (that isn't necessarily an admin/mod) and has your ip address. Now that person knows you're into crypto so you probably have some crypto accounts or wallets stored on your computer.
Example #2: And it doesn't even have to be forums that someone gets your ip address. It could also be seeding torrents. If you download/seed torrents those are other vulnerabilities. An unknown people have your ip address and although the odds of one of those people wanting to do something malicious is slim the odds are great that SOMEBODY at SOME POINT will.
So how to hack someone with an IP address? Well... nmap the ip address and look for ports open. My weakest point was RDP as it turned out. Check out how to hack RDP and you'll find tons of stuff! It's actually kinda scary how easy it can be! That's why I took quick action to lock my shit down.
With your IP address I can get your approximate location, maybe even your name/email, recent torrents that you've downloaded/seeded, open ports which will tell me what you do online (play games, IIS/FTP, remote access, etc).
There are also issues with some browser extensions:
Example: Here we have a very harmless (we thought) browser extension. It's nothing more than a downloader. Want to download something on Mega? It's a very useful download manager. https://www.bleepingcomputer.com/news/security/mega-chrome-extension-hacked-to-steal-login-credentials-and-cryptocurrency/
That's why I uninstalled ALL of the browsers on my mining machines and computers. I don't take any chances anymore. The one computer that I'm using now doesn't even have any access to crypto.
I set up a different e-mail address (normalemail.crypto@gmail.com) and while I was at it I set one up for my online purchases (normalemail.orders@gmail.com) which is only done on my laptop and cellphone (damn Amazon addiction.)
I'm not trying to dare a hacker but there's no way that even if they DID manage to hack the computer that I'm using that they would be able to do anything except mess up my social media and delete some files. If they did acquire my passwords through keylogger then they would only have access to non-crypto related crap. They could probably get into my banks/credit cards, etc but that stuff can be disputed and even cancelled. No permanent harm. But as you've discovered that once they're into your wallet... it's gone.
Another piece of advice, stop using your wallet! They might have your private keys. By continuing to use your old wallet you could pretty much be paying them without knowing it and they're just waiting for the perfect time to clean you out again.
So unless you have some solid proof please stop accusing a hardworking developer. Accusations on here without evidence is defamation and libel. It literally make HIM a victim. If you have (or think you have) sufficient evidence then go to law enforcement. Good luck with that.
BTW, with mining profitability starting to regain popularity I'd definitely be on your guard. We're all potential victims.