Remove “Hacker/Programmer who cracked your email months ago” Email Bitcoin Virus (March 2019 Update)

How irritating is this problem? (16 votes, average: 4.75)

This page aims to help you remove “Hacker/Programmer who cracked your email months ago”. Our removal instructions work for every version of Windows.

If you recently opened e-mail, stating something like this:


I’m a hacker who cracked your email and device a few months ago. You entered a password on one of the sites you visited, and I intercepted it.

Of course you can will change it, or already changed it.
But it doesn’t matter, my malware updated it every time.

Do not try to contact me or find me, it is impossible, since I sent you an email from your account.

Through your email, I uploaded malicious code to your Operation System.
I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a Trojan on your device and long tome spying for you.

You are not my only victim, I usually lock computers and ask for a ransom. But I was struck by the sites of intimate content that you often visit.

I am in shock of your fantasies! I’ve never seen anything like this!

So, when you had fun on piquant sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I combined them to the content of the currently viewed site.

There will be laughter when I send these photos to your contacts! BUT I’m sure you don’t want it.

Therefore, I expect payment from you for my silence.
I think $881 is an acceptable price for it!

Pay with Bitcoin.
My BTC wallet: 1DVU5Q2HQ4srFNSSaWBrVNMtL4pvBkfP5w

If you do not know how to do this – enter into Google “how to transfer money to a bitcoin wallet”. It is not difficult.
After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system.

My Trojan have auto alert, after this email is read, I will be know it!

I give you 2 days (48 hours) to make a payment.
If this does not happen – all your contacts will get crazy shots from your dark secret life!
And so that you do not obstruct, your device will be blocked (also after 48 hours)

Do not be silly!
Police or friends won’t help you for sure …

p.s. I can give you advice for the future. Do not enter your passwords on unsafe sites.

I hope for your prudence.

Then you are most probably a target of an email scam. However it is also very likely that you indeed have a malware on your device and need to take measures to rectify that situation as soon as possible.

Are you looking for information regarding a malware threat named “Hacker/Programmer who cracked your email months ago”? If so, then we advise you to read the following article as it will provide with some important details about this nasty computer virus and about the malware category that it belongs to. “Hacker/Programmer who cracked your email months ago” is a Trojan Horse virus program and if it is currently inside your PC, you certainly need to make sure to remove it as soon as possible in order to avoid system damage, virtual privacy invasion, theft or sensitive personal data as well as other possible unpleasant and dangerous consequences that the presence of such a virus inside your system could lead to. Trojans, as you all likely know are famous for their maliciousness and ability to cause different types of damage and harm to the targeted computer systems. That is why, we have done our best to supply the readers of this article with a detailed, yet easy-to-follow instructions that will help any of you who might have “Hacker/Programmer who cracked your email months ago” on their machines remove the cyber-threat and bring their machines back to normal. The removal instructions have been put together inside a guide manual that you can find down below. Within the guide, there’s also a recommended malware-removal program that you can also use while trying to get rid of the nasty Trojan virus so give it a go if you feel like it. In case you need further help or if you have any questions for us, feel free to hit us up by writing us a comment in the comments section – we highly value our communication with our readers and we will make sure to get back to you with a reply as soon as we read your comment. Hopefully, after reading our article and using the guide that we offer below, you will be able to successfully take care of this nasty malware threat.

Remove “Hacker/Programmer who cracked your email months ago” Email Bitcoin Virus



Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

The characteristics of the Trojan Horse malware class

Trojans, as you probably already know, are famous for their stealth and their ability to operate in silence without making their presence on the infected PC visible. At times, though, there could be certain symptoms to indicate a Trojan Horse infection. Some users might notice different kinds of irregularities with their system such as frequent errors and freezes, slow-downs, CPU, RAM and even GPU memory spikes, Blue Screen of Death system crashes and other similar disturbances that seem to be occurring for no visible reason. Such unusual PC behavior might indeed be caused due to the presence of a virus like “Hacker/Programmer who cracked your email months ago” on your machine, yet know that those irregularities could also be coming from some other software (or even hardware) problem that has nothing to do with a Trojan Horse infection. Still, we advise you to be on the lookout for any suspicious red flags and if you notice anything out of the ordinary happening with your computer carry out a full system scan with a reliable antivirus/anti-malware tool. This actually leads us to the next main element that needs to be factored in when it comes to handling a potential Trojan Horse threat – you need to have a good, strong security program installed on your PC. Being watchful and vigilant is important but oftentimes Trojans infections occur without any visible symptoms and red flags meaning that it might be next to impossible to manually detect the contamination. That is why, having a reliable security software on your machine could make the difference between intercepting and stopping the virus on time and allowing some nasty cyber threat like “Hacker/Programmer who cracked your email months ago” carry its insidious tasks completely and without getting spotted whatsoever.

PC protection in future and why Trojans are such a problem

Avoiding Trojans is a must if you want to keep your computer safe and your virtual privacy secured. Those viruses could cause a variety of different problems and could oftentimes be used for more than one tasks. A Trojan could attack your PC system and caused damage to it by corrupting important OS data or messing with your machine’s registry keys. Also, a virus such as “Hacker/Programmer who cracked your email months ago” might be able to spy on you or extract sensitive data from your system that that hackers behind the attack could later use for blackmailing, money theft or other similar nefarious activities. Other uses of a Trojan such as loading Ransomware viruses inside the infected machines or using the targeted PCs for cryptomining, spam distribution and DDoS attacks are also common.

Since Trojans are typically spread through online spam, malvertising ads and offers, pirated downloadable content and sketchy sites with low reputation, we strongly advise you to keep from any online content or web addresses that do not seem safe and that might potentially be hazardous to you and your PC. Remember, you are the best protection that your PC has and if you do not take the security of your system in your own hands, no security program would be able to fully help you prevent future infections by “Hacker/Programmer who cracked your email months ago” or other similar malware threats.


Name “Hacker/Programmer who cracked your email months ago”
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Sudden system crashes, freezes, errors as well as any other kind of unusual PC behavior.
Distribution Method Infected spam e-mail attachments, illegal sites that generate hazardous ads or that contain pirated software downloads.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment