"On this day i hacked your os and got full access to your account" Removal steps

"On this day i hacked your os and got full access to your account" is just a part of strange email that comes to many users. It contain fake information about the passwords and scary users by fake information about porn site visiting. However, Trojan virus can infect the system. It's good to know the signs of infection:

  • Unfamiliar processes in Task manager
  • The speed of computer is greatly reduced
  • Suspicious pop-ups on computer desktop

 

XXX trojan virus

In 95% this email is just a fake, but other system can really be corrupted by malware. Many users believe that to stop malware infection they just have to buy an antivirus, but that's wrong. No antivirus can help you if you download new viruses every day. To ensure security, you should reconsider your habits, and act prudently in the Web. There are two ways to achieve this effect:

  • If you are not ready to absolutely forget about using not official programs, you have to thoroughly inspect each downloaded program. Trojans most often lurk beneath the guise of useful utilities such as browsers, search engines, driver updaters, browser games, system optimizers and special software. Don't download weird tools from the above list, and while any unlicensed utility is installing - watchfully follow the installation, canceling all proposals for installing more programs.
  • The safest way is to completely stop using utilities of suspicious provenance. These principles concern any program downloaded not from website of its developer or licensed vendors. Of course, any pirated copies of paid programs also are potentially dangerous. If you stop installing suchlike utilities, the chances of penetration would be lowered to a minimum, and AV-software can quickly deal with this minimum.

Listen to these advices and you'll clearly see their fruits: the machine will become clean, workable and fast, and will be so for a long time.

Virus removal instruction

 

In usual cases we suggest two manners to remove perilous programs, but unfortunately, when uninstalling Trojans, there are far fewer manners to find and delete them by hand. Trojan can hide in the root folder of any of your programs, so an inexperienced customer can slip up, remove a crucial data and cause a system failure. To avoid this, we've made a guide that will help you to get rid of malware quickly and effectively. The first stage is to boot the device in Safe Mode and inspect system folders. The second step is to download and install trusted anti-viral tool. After that - follow the guide, and in a few minutes your computer will be able to work again.

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab

Startup

Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

We suggest to use Spyhunter antimalware scanner. Remember that there's no have to immediately buy Spyhunter - there's a possibility to examine its effectiveness by downloading an unpaid trial version. If you're interested in buying Spyhunter or need some additional info - press the link under this paragraph.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

Video guide

Add comment

Security code
Refresh

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.