Trojan

Remove 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn Bitcoin Mail Virus


How irritating is this problem? (7 votes, average: 5.00)
Loading...

This page aims to help you remove 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn. Our removal instructions work for every version of Windows.

Some of our users reported an email that they have received, stating the following:

Hi! I know your password is: 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn14poC1Jg97vuvsyoKSZYz7h276LoAZcrtnxx Some time ago I infected your computer with mine private malware ( RAT ) Remote Administration Tool. I collected absolutly everything from your computer, your private photos, videos, all contacts, I got access to all your accounts. My malware even gave me control over your webcam and microphone, yes, such things exist, you can google it! WHILE YOU HAVE MASTRUBATED I RECORDED A VIDEO OF YOU (through your webcam)!!! You know this all isn’t a joke! You got the proof above! After that I removed the malware, right now it’s no longer on your computer. What you think will happen, if I publish absolutly everything on social network, to all your contacts, and everywhere else?! We both know that your life won’t be the same. So I give you the chance to stop me, pay exactly: 1400$ with bitcoin. I think it’s a very good price, compared to living hell. If you don’t know where to buy bitcoin My wallet is: 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn MsgID: 7383710050

Multiple antivirus programs have detected the trojan using 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn Bitcoin Wallet. You can see the attachment from VirusTotal below:

Antivirus programs detecting the virus

A number of users have recently reported that their email inboxes have been getting spammed with some strange email BitCoin-demanding messages that ask them to pay a ransom to some self-proclaimed hackers. The premise of these messages seems to be based on a simple blackmailing scheme, the aim of which is to extort money out of the scared victims. The messages that get sent typically act as a harassment threat from a hacker, who claims that they have compromised your computer with a hidden malware and have gained access to some sensitive information, personal photos, videos, conversations and other pieces of data. The crook threatens that they will make the acquired info public or do something bad to the computer with the help of the dormant infection unless you pay a certain amount of money to their BitCoin wallet. If you are on this page because you have received a message with a similar premise, then you should know that this could be (and likely is) a scam. Therefore, it is not a good idea to trust anything that is stated there or transfer your money to the hackers behind the message. Instead, our team of professionals suggests that you check your computer first, to find out if you really have a malware piece inside your machine which could possibly provide the hacker with access to the system and the data that’s theret. For that, the first thing you should do is run a full system scan with an updated antivirus program or a trusted malware-removal tool. If you don’t have a security program on your machine or you just want to double check your PC, below, you will find a professional security tool that can do the job and can help you remove any potential threats.

More information about the nature of such scams

The email scams like are a quick and popular method that the cybercriminals use to make some quick money on the back of the frightened users. That’s why, in most of the cases, they may simply lie about infections with Trojans, Spyware or other viruses while, in reality, the users’ computers are perfectly safe and clean. Yet, we can’t ignore the fact that some very dangerous and harmful threats may also be distributed via spam emails and scam messages like the email BitCoin scam letters that we talk about. 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn, 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn17v35QnAre7Vd2T74SD9xhEGJVwYfTPDhN,1ES14c7qLb5CYhLMUekctxLgc1FV2Ti9DA for instance, are nasty Trojan-based infections, which could be linked to messages like the ones that we described above because it travels around the web via spam and fake emails. One click on the transmitter message is enough to activate 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn i your computer and, sadly, due to the lack of any particular symptoms, you may not even realize that you have been secretly compromised. Once inside the system, 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn can easily carry out various criminal activities, including espionage through your webcam and mic, theft of personal information, passwords, login credentials or online banking details. The malware can also provide its creators with full remote access to your computer. All in all, this Trojan can cause major problems in your system and with your privacy and can conduct a number of harmful activities that could negatively affect your system’s performance, its speed and stability. Therefore, it is highly advisable to use a professional removal tool for precise detection of the malware and immediately remove 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn or anything else that may get detected using the guide below and/or the removal program we’ve included in it.

SUMMARY:

Name 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Blackmail messages from hackers may potentially indicate the presence of a Trojan in the system.
Distribution Method  Spam messages, malicious emails with harmful attachments, fake ads, misleading links, infected websites, cracked software.
Detection Tool

Remove 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn Bitcoin Email Virus

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet


After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

virus-removal1

Step4

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Step5

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


Leave a Comment