How to remove Save Yourself

This guide is devoted to the virus message, that can be known as Save Yourself, because of the word in the beggining of the scam e-mail.

Hi, I know one of your passwords is: ... – but not only that! Your computer was infected with my private malware, because your browser wasn’t updated / patched, in such case it’s enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more – Google: “Drive-by exploit”.My malware gave me full access to all your accounts (see password above), full control over your computer and it also was possible to spy on you over your webcam. I COLLECTED ALL YOUR PRIVATE DATA and I RECORDED YOU through your webcam, I must say – the result is some GOOD MATERIAL! :) After that I removed my malware to not leave any traces and this email was sent from some hacked server. I can publish the videos of you and all your private data on the whole web, social networks, over email of all your contacts. But you can stop me and only I can help you out in this situation. Mail-Client-ID: ... You can easily buy bitcoin here: www.paxful.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my wallet, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin wallet is: ... I give you 3 days time to pay.

The subject of this article is "Save Yourself" e-mail scam that is called so because of words that were written in the scarry message. It called the huge wave of complaints lately. If you received such mail, then you most likely experience certain difficulties with virus. Programs of the Trojan sort are distinguished by their high efficiency, and are able to strongly resist removal, setup their backups and reinstall after incorrect removal. But there is a very low probability of real malware infection, because it's a social fraud. In case, you are worry about real virus on the computer, follow or brief guide about trojans.

IT-specialists declare that Trojans make up the biggest share of all perilous programs, thanks to usability and efficiency. Such aims in most cases have illegal or semi-legal properties, such as spying on the user, theft of passwords and crucial data, botnets development or updating and controlling already installed adware. The most significant weakness of Trojans is being explained by their name - they can't infect anything without victim's consent. Usually customers think that virus is everything that is bad for their machines, but you can't call Trojans viruses, since virus is the self-replicating software, capable of quickly distribute itself over data carriers and the Internet. Trojan viruses can’t reproduce themselves, and can’t infest the machine on their own. After entering the device, the Trojan is almost impossible to detect without assistance of antiviral software that is very valuable for all types of scammers. All the facts written above bring us to an easy solution: Trojans should be detected and neutralized until they get into the PC.

The majority of customers believe that to neutralize viral infection they just need to purchase an AV-tool, but it's wrong. Antiviruses are extremely useful, but they cannot block you the access to infected webpages, and forbid you to download anything you want, including malware. To ensure security, you need to reconsider your habits, and act prudently in the Web. It's not difficult, and you'll have to abide one of the following rules:

  • The very reliable option is to totally quit using utilities of suspicious origin. By these we mean any program downloaded not from the official developer websites or licensed distributors. Obviously, any pirated replicas of paid software also are potentially harmful. If you quit using such tools, the chances of infection would be lowered to a minimum, and AV-software will be able to easily cope with this minimum.
  • If you aren't going to fully forget about using not official programs, you should thoroughly inspect all tools that you're installing. Trojans usually lurk under the guise of useful programs such as browser games, AV software, driver updaters, browsers, search engines and system optimizers. Do not install weird tools from the above list, and while any unlicensed tool is installing - watchfully follow the installation, revoking all proposals for installing extra software.

 

Trojans removal instruction

If you are MAC user, follow this guide How to remove virus from MAC

Trojans rarely infect the system on their own, so you shouldn't focus on the deletion of one program, but inspect the system as a whole. If you had encountered Trojan viruses before - just go to the removal instructions, but if Trojan viruses are something new for you - inspect the following paragraphs to learn how to protect the PC against such threats.

Commonly we offer two ways to get rid of perilous software, but unfortunately, when removing Trojans, there is literally no way to find and delete them by hand. Trojan can be hidden literally anywhere on the hard drive, so a novice customer can make a mistake, delete a crucial file and damage the OS. To avoid this, we've compiled a guide that will help you to eliminate Save Yourself easily and effectively. Stage #1 is to go into Safe Mode and inspect system data. The second step is to download and install Spyhunter antivirus. After that - abide the instructions, and in a few moments your PC will be able to work again.

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab

Startup

Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

Don't forget that there's no need to immediately buy Spyhunter - you can familiarize with its advantages by getting a free trial version. If you’re going to download Spyhunter or need more information - press the link under this paragraph.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

Video guide

 

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.