@Claymore
Saw this today in my log file:
08:38:29:239 4304 checked ETH share on CPU, spent 4ms
08:38:48:975 43b8 checked ETH share on CPU, spent 3ms
08:39:09:055 43c0 checked ETH share on CPU, spent 3ms
Don`t think that is normal.
Nothing to worry about, this is totally normal.
Look back through your old logs, (use grep for example), and you'll see it's a regular event in the log.
Mr Claymore would be the only person who can explain why he's programmed this, but no doubt there is a logical reason.
Side note: Generally, (assuming the programmer is not a total moron), log entries will have some prefix, or suffix, "warning", "error", "OK", "good" etc etc, which makes life easier when searching logs for problem events, or notable events you might like to check on.
Conversely, if you don't see such annotations, and the log entry is not self explanatory, you can generally ignore such entries. (as in they are not things you need to worry about).
And No, it's not a virus either.
Thanks for your reply iSuX. I was just wondering why is there CPU share
Thanks iSuX. I checked old logs and see that this event is in all of them. I never noticed it before. I was experiencing system instability yesterday, checked the log, saw this event, assumed it was a virus, ran virus scanner, removed viruses, and system went back to stable. IDK how I got a virus, but thanks for pointing out that it's not related to the cpu share.
Like Snake, I would appreciate an explanation from Claymore for why the program is checking for eth shares on the CPU. Maybe it's checking for a virus mining on the cpu?
@androstan1234
Bummer man, what virus was it you had?
It was called coin-bitminer or something like that. First time this has happened to me in almost 10 months of mining. IDK how it happened. Maybe related to windows 1803 update since that's the only thing that's changed. But I updated both of my rigs, and both use the same router (really a 4G LTE hotspot). Only one caught the virus.
On the subject of Virus, sigh, if you take 2 milliseconds to think about that, and you can probably assume a virus is unlikely to have your best intentions to heart, ergo, it's going to do something you'd rather not have happen, well, it's hardly likely to have the moronic goal of hacking the claymore binary to make it mine with the CPU or advertise itself, by writing it's own log entries.
Hahahaha.
I mean, people make stupid viruses, and stupid, lazy, and/or inattentive people fall for them. I figured, maybe someone found a way to force claymore software to mine on cpu and send shares to their wallet, thinking that a tiny amount of mining on a cpu would go unnoticed. A side effect could be that the claymore software dutifully reports and logs whatever is going on. If enough rigs get infected, all those tiny amounts could add up to a decent chunk of free money.
I bet you watch a lot of sci-fi, lol, jk
Joking aside, you make a lot of generalisations here, and while from a frustration pov, you might call a virus "stupid", probably understandably on an emotional level, but what you describe would be a highly sophisticated piece of software, IF it were even possible at all.
In reality, if one had the time, money, resources and skills to pull that off, it would be highly unlikely you'd then advertise what was done in the logs. Hardly very stealthy, and ensuring alarm bells are going off everywhere.
That ability/means would also be an exceptional asset, and one you would not squander on a poor gain, high risk, and advertising the fact.
More or like less robbing every bank in town, and leaving your calling card, name and address at the crime scene, tripping the fire alarm for good measure, now THAT would be stupid.
Equally, somehow decompiling claymore, and adding in code to CPU mine, recompiling, inventing some delivery method, (very challenging, very not-stupid I assure you), for some paltry gain doing CPU mining, something that would be very obvious to the user, when one already has a GPU miner application, and you could simply deploy a local man-in-the-middle method, and siphon off a share here and there, now THAT would give you some gain, could be quite stealthy, has been done already, the code is out there.
Something to realise is, such actions are generally considered crimes, but these programmers are not stupid people, they are usually highly intelligent, and while their actions in use of their programs is probably stupid, that comes later, before then, the programming etc, is usually pretty sophisticated, cleaver, devious, and very well thought through and engineered, (so as to circumvent all the known detection methods).
As time goes on, these programs get out there, get identified and tagged, and added to antivirus databases.
This is also very big business, and is synergistic with malware, perversely a kind of malware in itself, but certainly reliant on malware programmers, feeding off them in fact.
By this I mean, "I don't want antivirus software on my rigs, but I have to have it because of malware, which is just some other software I don't want".
So, it's in their interest to tag as many applications as malware as possible. Why?
Because it creates fear and worry in people, and makes them purchase anti virus software.
Insurance companies have been doing exactly this for decades. Make people worry about something, then offer them "a solution", at a price of course, and one that ensures the insurance company is in healthy profit.
In fact, if one looks specifically at Claymore, and how it's sometimes identified as malware, proves the point I'm making.
He is an analogy.
A kid goes down the street one night, gets into an altercation, and gets stabbed by a screwdriver.
Weapon = screwdriver.
A builder leaves site the same night, walks down the same street carrying his tool bag, are his screwdrivers weapons?
The VAST majority of software tagged as malware, (weapons) are actually
simply tools, what determines the difference is HOW YOU USE THEM.
This is something the antivirus software vendors turn a convenient blind eye to, as they would have rather have you worried by the millions of malware items they have in their databases.
Anyway, aside from all this, if I might offer some advice.
If you ever get a detection, write it down, use a different computer to research it, make sure you know what it is, IF you need to remove it, and especially the method of infection.
Otherwise you'll probably see it again in the future.
While you might be right, there are a lot of stupid people out there, myself included at times, malware infection is designed to trick people. If you keep stepping on to the playing field, no matter how good you are, sooner or later, you'll be beaten.
Does that make you stupid?