I made a split-screen video
If “I made a split-screen video” has invaded your computer, you are dealing with a very dangerous Trojan horse virus. “I made a split-screen video” may cause irreversible damage to you and your system, so it is crucial that you remove it as soon as possible.
Many of our users complained that they received an Email with the following message:
I know, xxx, is your password. You don’t know me and you’re thinking why you received this e mail, right?
Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.
What exactly did I do?
I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).
What should you do?
Well, I believe, $1900 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).
(It is cAsE sensitive, so copy and paste it)
You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.
Trojan horse viruses are notorious for their very wide range of malicious capabilities. And this has contributed to making them the most numerous malware category out there. A whopping 80-90% on average of all malware attacks are owed exactly to Trojans, so you are more likely to land a Trojan horse virus than any other type of malicious code.
And this has come to be because they can perform very many different tasks on the infected computer. On the other hand, Trojans have also gained a reputation for being sneaky and almost completely unnoticeable. It’s not uncommon for variants like “I made a split-screen video” to sometimes remain in the system doing their dirty business completely undisturbed for weeks, months and even years at a time. This makes it highly difficult to detect Trojans, especially if you don’t have a powerful enough antivirus tool on your computer.
But the good news is that, since you’re here, you’ve already managed to discover “I made a split-screen video” on your PC. And that means you’re already halfway through the process of dealing with this issue. Now all you have to do is remove the virus and we can assist you in this with our detailed removal guide below. Just be advised that this malware has a tendency to disguise itself as and hide among system files, so caution is necessary. If you fear accidently deleting the wrong file, you might want to use our automatic removal tool instead.
I made a split-screen video. First part recorded the video you were viewing
We won’t cover all the potential harmful effects that “I made a split-screen video. First part recorded the video you were viewing” may have on its victims’ computers, but we’ll briefly outline the most common ones. For instance, there’s outright system corruption, there’s data theft that can be achieved through various means such as keystroke logging and others. This means that theoretically the cybercriminals behind “I made a split-screen video. First part recorded the video you were viewing” could potentially gain access to sensitive information like passwords, logins, online banking credentials, etc.
In addition, a Trojan horse virus like this one may also be used to exploit your system’s resources and serve the hackers in various ways. Your computer could be made to mine cryptocurrencies for them, for instance, send out spam, infect other users, etc.
Now, what’s important to know when it comes to preventing such attacks is the methods used to distribute Trojans. And spam messages tend to be the leading source for this, as well as other types of malware. Therefore, be very critical of any incoming emails or social media messages, especially those containing attachments and/or links. Similarly, malrvertisements have become a highly common Trojan distribution method. These are basically online ads that have been injected with malicious code like “I made a split-screen video”. And upon clicking such ads, users automatically download the Trojan or whatever malware was in them. And for this reason we usually recommend that users abstain from interacting with online ads.
|Name||“I made a split-screen video”|
|Danger Level||High (Trojans are often used as a backdoor for Ransomware)|
|Symptoms||Trojans are notoriously stealthy and do not normally have any noticeable symptoms.|
|Distribution Method||Malicious online ads, infected downloadable content such as torrents, cracked software, and spam messages.|
Some threats reinstall themselves if you don't delete their core files. We recommend downloading SpyHunter to remove harmful programs for you. This may save you hours and ensure you don't harm your system by deleting the wrong files.
Remove “I made a split-screen video” Email Malware
If you are looking for a way to remove “I made a split-screen video” you can try this:
- Click on the Start button in the bottom left corner of your Windows OS.
- Go to Control Panel -> Programs and Features -> Uninstall a Program.
- Search for “I made a split-screen video” and any other unfamiliar programs.
- Uninstall “I made a split-screen video” as well as other suspicious programs.
Note that this might not get rid of “I made a split-screen video” completely. For more detailed removal instructions follow the guide below.
If you have a Windows virus, continue with the guide below.
If you have a Mac virus, please use our How to remove Ads on Mac guide.
If you have an Android virus, please use our Android Malware Removal guide.
If you have an iPhone virus, please use our iPhone Virus Removal guide
Some of the steps will likely require you to exit the page. Bookmark it for later reference.
Reboot in Safe Mode (use this guide if you don’t know how to do it).
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous.
Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:
This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/
After you open their folder, end the processes that are infected, then delete their folders.
Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.
Hold together the Start Key and R. Type appwiz.cpl –> OK.
You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:
Type msconfig in the search field and hit enter. A window will pop-up:
Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.
- Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
Type Regedit in the windows search field and press Enter.
Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:
- HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random
If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!