Please, have in mind that SpyHunter offers a free 7-day Trial version with full functionality. Credit card is required, no charge upfront.
Can’t Remove Remove 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW Malware pop-ups?
The email reads:
Hello!
I know your password is: ********
I infected you with a malware (RAT) / (Remote Administration Tool), some time ago and since then, I have been observing your actions.
The malware gave me full access and control over your system, meaning, I can see everything on your screen, turn on your camera or microphone and you won’t even notice about it, yes such things exist, you can google it!
I have also access to all your contacts, I collected everything private from you, pictures, videos, everything!
And I MADE A VIDEO SHOWING BOTH YOU (through your webcam) AND THE VIDEO YOU WERE WATCHING (on the screen) WHILE STATISFYING YOURSELF!
I can send this video to all your contacts (email, social network) and publish all your private stuff everywhere!
You can prevent me from doing this!
To stop me, transfer exactly: 2400$ with the current bitcoin (BTC) price to my bitcoin address.
If you don’t know how to get bitcoin, Google – “How to buy Bitcoin”, it’s very simple for example with credit card.
The wallet you can create here: www.login.blockchain.com/en/#/signup/
My bitcoin adress is: 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW
Copy and paste my adress – it’s (cAsE-sensitive).
You know this all isn’t a joke, you got the proof above!
I think it’s a very good price compared to the damage and hell it can bring into your life!
After receiving the payment, I will delete everything from you and you can life your live in peace like before.
I give you 3 days to get the bitcoins!
Don’t share this email with anyone, this should stay our little secret!
1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW is the address of Bitcoin wallet which is linked to online scams. If you receive a threatening message that urges you to transfer BTC to this address, do not panic! The message is a hoax. The crooks behind it use common misconceptions to lure you into impulsive actions. Their scheme is very simple. They pretend to be hackers who have infected to your PC through a porn website. They claim that their virus has recorded a compromising video of you during private moments. The crooks threaten to leak this video if you don’t transfer about $1000 worth of BTC to the 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW wallet. Do not swing into action! The crooks push you into impulsive actions. These people play games with your fears. They may even mention an old password of yours. These details, however, are obtainable from publicly available databases of leaks login credentials. The crooks also buy such data on the dark web, as well as employ scamware to accumulate target email addresses. These criminals feed you lies. Don’t fall for their tricks. Acknowledge that you have fallen prey to scamware and delete the deceptive message. Scan your computer for viruses, remove the detected threats, and move on. Don’t let this email ruin your day!
How did I get infected with?
1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW Bitcoin message pops up by courtesy of scamware. As for the parasite, it sneaks into your computer through trickery. The sneaky parasite hides in freeware, fake updates, corrupted links, and pirated software. It lurks in the shadows and waits for an opportunity to strike. Do not make its job easier. Don’t let your guard down. This parasite infects your computer only when you throw caution to the wind. If you do your due diligence, your computer remains free of infections. Even a little extra attention can spare you an avalanche of problems. So, choose caution over carelessness. Don’t visit questionable websites. Download software and updates from reliable sources only. And of course, don’t skip installation steps. More often than not, the apps we download off the Web come bundled with bonus software. If you don’t pay attention to the fine print, you might install malicious extras. Don’t rely on luck. Forget about the “Next-Next-Finish” strategy. If available, use the advanced/custom setup option. Under it, you will be able to deselect all unwanted bonuses. Make sure you know what you install. Go through the terms and conditions before you agree to them. If you cannot read the whole document, scan it with an online EULA analyzer. Opt out of the installation if you notice anything suspicious!
Why are these ads dangerous?
1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW Bitcoin email appears out of the blue. It threatens to send a compromising video of you to your contact list if you don’t pay up. The crooks behind the email demand an astonishing ransom paid in Bitcoin. Don’t be mistaken, though. The currency choice is not a caprice. The Bitcoin currency is untraceable. You cannot get your money back if something goes wrong. And that’s inevitable. Paying the ransom won’t accomplish anything. The crooks don’t have a video of you, much less a compromising one. These tricksters use scare tactics to push you into impulsive actions. Don’t give into naivety! Take a moment to consider the situation. Note that the 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW email doesn’t mention your name or username. It doesn’t specify which website was hacked. And, most importantly, it doesn’t provide proof of the infection. The message is generic. The crooks behind it use scamware to flood the Web with deceptive emails. Do not sponsor their activities. Delete the email! If you suspect that your computer might harbor scamware or some other type of parasite, run a virus scan! Make sure that your OS is infection-free and move on!
How Can I Remove Remove 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW Malware Pop-ups?
Please, have in mind that SpyHunter offers a free 7-day Trial version with full functionality. Credit card is required, no charge upfront.
If you perform exactly the steps below you should be able to remove the infection. Please, follow the procedures in the exact order. Please, consider to print this guide or have another computer at your disposal. You will NOT need any USB sticks or CDs.
STEP 1: Uninstall suspicious software from your Add\Remove Programs
STEP 2: Delete unknown add-ons from Chrome, Firefox or IE
STEP 1 : Uninstall unknown programs from Your Computer
Simultaneously press the Windows Logo Button and then “R” to open the Run Command
Type “Appwiz.cpl”
Locate the any unknown program and click on uninstall/change. To facilitate the search you can sort the programs by date. review the most recent installed programs first. In general you should remove all unknown programs.
STEP 2 : Remove add-ons and extensions from Chrome, Firefox or IE
Remove from Google Chrome
- In the Main Menu, select Tools—> Extensions
- Remove any unknown extension by clicking on the little recycle bin
- If you are not able to delete the extension then navigate to C:\Users\”computer name“\AppData\Local\Google\Chrome\User Data\Default\Extensions\and review the folders one by one.
- Reset Google Chrome by Deleting the current user to make sure nothing is left behind
- If you are using the latest chrome version you need to do the following
- go to settings – Add person
- choose a preferred name.
- then go back and remove person 1
- Chrome should be malware free now
Remove from Mozilla Firefox
- Open Firefox
- Press simultaneously Ctrl+Shift+A
- Disable and remove any unknown add on
- Open the Firefox’s Help Menu
- Then Troubleshoot information
- Click on Reset Firefox
Remove from Internet Explorer
- Open IE
- On the Upper Right Corner Click on the Gear Icon
- Go to Toolbars and Extensions
- Disable any suspicious extension.
- If the disable button is gray, you need to go to your Windows Registry and delete the corresponding CLSID
- On the Upper Right Corner of Internet Explorer Click on the Gear Icon.
- Click on Internet options
- Select the Advanced tab and click on Reset.
- Check the “Delete Personal Settings Tab” and then Reset
- Close IE
Permanently Remove Remove 1HB3KtKoguFuZ4BdmCv9Fc4tYTwDQgmqmW Malware Leftovers
To make sure manual removal is successful, we recommend to use a free scanner of any professional antimalware program to identify any registry leftovers or temporary files.