I have video of you
“I have video of you” is what is known as a Trojan horse virus. As such, “I have video of you” can infect pretty much all operating systems, including all versions of Windows.
Some of our users received a disturbing email with this message:
𝐈 𝐡𝐚𝐯𝐞 𝐯𝐢𝐝𝐞𝐨 𝐨𝐟 𝐲𝐨𝐮 𝐰𝐡𝐢𝐥𝐞 𝐲𝐨𝐮 𝐰𝐞𝐫𝐞 𝐩𝐥𝐚𝐲𝐢𝐧𝐠 𝐰𝐡𝐢𝐥𝐞 𝐛𝐫𝐨𝐰𝐬𝐢𝐧𝐠 𝐩𝐨𝐫𝐧 𝐰𝐞𝐛𝐬𝐢𝐭𝐞𝐬 𝐥𝐚𝐬𝐭 𝐭𝐢𝐦𝐞. 𝐃𝐨𝐧’𝐭 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐦𝐞? 𝐇𝐞𝐫𝐞’𝐬 𝐨𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐒𝐭𝐢𝐥𝐥 𝐝𝐨𝐧’𝐭 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐦𝐞? 𝐑𝐞𝐩𝐥𝐲 𝟓 𝐚𝐧𝐝 𝐈’𝐥𝐥 𝐛𝐞 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐡𝐚𝐫𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐥𝐨𝐯𝐞𝐥𝐲 𝐯𝐢𝐝𝐞𝐨 𝐰𝐢𝐭𝐡 𝟓 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐜𝐥𝐨𝐬𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬. (𝐘𝐞𝐬, 𝐈 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬 𝐭𝐨 𝐭𝐡𝐞𝐦 𝐚𝐬 𝐰𝐞𝐥𝐥!) 𝐈 𝐡𝐨𝐩𝐞 𝐭𝐡𝐚𝐭’𝐬 𝐞𝐧𝐨𝐮𝐠𝐡 𝐨𝐟 𝐩𝐫𝐨𝐨𝐟. 𝐍𝐨𝐰 𝐦𝐨𝐯𝐢𝐧𝐠 𝐨𝐧 𝐭𝐨 𝐢𝐦𝐩𝐨𝐫𝐭𝐚𝐧𝐭 𝐩𝐚𝐫𝐭. 𝐖𝐡𝐚𝐭 𝐝𝐨 𝐈 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐝𝐢𝐬𝐚𝐩𝐩𝐞𝐚𝐫? 𝐈 𝐧𝐞𝐞𝐝 𝐲𝐨𝐮 𝐭𝐨 𝐬𝐞𝐧𝐝 𝟎.𝟑 𝐛𝐢𝐭𝐜𝐨𝐢𝐧 ($𝟐𝟎𝟎𝟎~) 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬. (𝐈𝐟 𝐮 𝐝𝐨𝐧𝐭 𝐤𝐧𝐨𝐰 𝐚𝐛𝐨𝐮𝐭 𝐛𝐢𝐭𝐜𝐨𝐢𝐧, 𝐣𝐮𝐬𝐭 𝐠𝐨𝐨𝐠𝐥𝐞 𝐚𝐛𝐨𝐮𝐭 𝐢𝐭) bc1***qaxkw0fjph97gptw83yu5ju0de7lfrvt2fr0jhn 𝐜𝐚𝐬𝐞 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐚𝐰𝐚𝐲 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬 𝐈 𝐚𝐦 𝐤𝐞𝐞𝐩𝐢𝐧𝐠 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐡𝐨𝐫𝐭 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞 𝐢𝐬 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐚𝐧𝐝 𝐲𝐨𝐮 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐥𝐞𝐟𝐭 𝐭𝐨 𝐦𝐞𝐞𝐭 𝐦𝐲 𝐝𝐞𝐦𝐚𝐧𝐝. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐬𝐭𝐚𝐫𝐭𝐬 𝐧𝐨𝐰!
And once it becomes incorporated into your computer, this software will typically burrow very deep so it can remain hidden for as long as possible. With that in mind, you should also know that Trojans like “I have video of you” don’t tend to exhibit any kind of symptoms, which makes them an invaluable tool for hackers. As a matter of fact, this very quality of theirs is largely what has made them the most numerous malware category on the web. As it so happens, Trojans are responsible for some 80-90% of all malware attacks, depending on the source. But either way, the stats are quite impressive – and not in a good way.
Therefore, it’s quite lucky that you have managed to detect “I have video of you” and are now searching for a way to get rid of it. For this purpose we have designed a special removal guide that is free of charge and available to all “I have video of you” victims right on this very page. We must warn you that it is vital you follow all steps in the removal exactly as they are written, otherwise you risk deleting the wrong files and this may result in permanent system damage. If, however, you’d rather not risk it, we also have a professional malware removal tool available which will handle the process of eliminating this Trojan for you.
“I have video of you”’s capabilities
Another factor that makes Trojans irreplaceable to hackers and cybercriminals is their unique versatility. They are, so to speak, a Jack of many trades. In other words, a malicious piece of programming like “I have video of you” can be tasked with anything from data theft to data corruption, to system resources exploitation and even with spying on its victims!
It’s no joke, “I have video of you” could potentially give its owners remote access to your webcam and microphone, allowing them to watch you and eavesdrop on you without your knowledge. Similarly, this virus can also log your keystrokes, thus gaining access to your login details, passwords, pin codes and whatever other sensitive and private information that you can think of. In turn, this information can be misused in all sorts of ways.
You could fall victim to identity theft, your bank accounts can be drained, the hackers could take control of your social media, etc. Alternatively, as a very different example, malware like this can turn your computer into a bot and make it mine cryptocurrencies for the hackers. In that same line of thought, your machine’s resources may also be put to work for other purposes, like distributing spam or infecting other computers in the same network.
And the list goes on and on. What’s important is that you try and prevent such attacks before they occur henceforth. You can do this by making sure your system isn’t vulnerable (i.e. updating it on a regular basis and having a high-quality antivirus program) and by avoiding the most obvious malware sources such as spam messages, unsafe web locations, pirated and cracked content, etc.
|Name||“I have video of you”|
|Danger Level||High (Trojans are often used as a backdoor for Ransomware)|
|Symptoms||Trojan horse virus infections typically run without any symptoms, but on occasion you might be able to observe an unusual increase in CPU and RAM usage.|
|Distribution Method||Spam messages, pirated content that is available for free download on various torrent sites and similar platforms; malvertisements, etc.|
Some threats of this type reinstall themselves repeatedly if you don't delete their core files. We recommend downloading SpyHunter to scan for malicious programs. This may save you hours and cut down your time to about 15 minutes.
Remove I have video of you Email
If you are looking for a way to remove “I have video of you” you can try this:
- Click on the Start button in the bottom left corner of your Windows OS.
- Go to Control Panel -> Programs and Features -> Uninstall a Program.
- Search for “I have video of you” and any other unfamiliar programs.
- Uninstall “I have video of you” as well as other suspicious programs.
Note that this might not get rid of “I have video of you” completely. For more detailed removal instructions follow the guide below.
If you have a Windows virus, continue with the guide below.
If you have a Mac virus, please use our How to remove Ads on Mac guide.
If you have an Android virus, please use our Android Malware Removal guide.
If you have an iPhone virus, please use our iPhone Virus Removal guide
Some of the steps will likely require you to exit the page. Bookmark it for later reference.
Reboot in Safe Mode (use this guide if you don’t know how to do it).
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous.
Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:
This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/
After you open their folder, end the processes that are infected, then delete their folders.
Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.
Hold together the Start Key and R. Type appwiz.cpl –> OK.
You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:
Type msconfig in the search field and hit enter. A window will pop-up:
Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.
- Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
Type Regedit in the windows search field and press Enter.
Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:
- HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random
If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!