Rather than your eyes have the right types of monitoring systems installed to give you peace of mind.
It has become quite a thing that malware packages install crypto mining software on the victim’s machine. Stealing compute cycles, power, performance and network bandwidth from you.
Here is an article from The Regisiter looking at the issue.
Tor2Mine cryptominer is warning sign of network exploitation • The Register