Remove “I Hacked This Mailbox More Than Six Months Ago” Darknet Email Virus (April 2019 Update)

How irritating is this problem? (1 votes, average: 5.00)


This page aims to help you remove “I Hacked This Mailbox More Than Six Months Ago” Darknet Email Virus Message. Our removal instructions work for every version of Windows.

“I Hacked This Mailbox More Than Six Months Ago” is the name of a mass spam email campaign designed to scare you into sending ransom payments in bitcoins to a specific wallet. This might be a scam, but it would also indicate you have some security issues to deal with!

You may not even have a clue when and how exactly this malware could have inserted its malicious code inside your OS and it may take weeks, months or even years to detect it! Luckily, if you are reading the information from this page, you most probably already know that you are dealing with “I Hacked This Mailbox More Than Six Months Ago” and that its harmful code is lurking somewhere inside your computer. The difficult part is to correctly locate and remove it and this is exactly what we are going to help you with in the next lines. The information that follows describes the specifics of the Trojan horse malware category and the possible harmful features of “I Hacked This Mailbox More Than Six Months Ago” in particular. If you don’t know what kind of damage to expect from this infection, we will help you gain a better understanding of its abilities. What is more, we will cover the most common infection methods and transmitters of the Trojans so that you know what to avoid and how to protect your PC in future. A manual Removal Guide and a professional “I Hacked This Mailbox More Than Six Months Ago” removal tool are also at your disposal just below because you will definitely need some help to eliminate the nasty malware as soon as possible.

Introduction to the Trojan horse malware category

Every person who has a computer should try their best to protect the PC from Trojan horse infections. The reason is that when such a malware gets inside the system, it can harm it in such a way that it might be totally corrupted and useless after the attack. Many cybersecurity experts regard Trojans as the ultimate computer threat because of their high level of stealth and also due to their advanced and versatile malicious abilities. Infections such as “I Hacked This Mailbox More Than Six Months Ago”, for instance, are capable of carrying out different criminal activities, which means that the PC could get attacked and harmed in a number of ways. That’s why, it is extremely important to detect and remove it as soon as possible.

Remove I Hacked This Mailbox More Than Six Months Ago


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

A malicious piece of software such as “I Hacked This Mailbox More Than Six Months Ago” could effectively disguise itself as something completely harmless-looking (usually a link, an ad, a pop-up, an email attachment, a free software installer, an image or something else) in order to trick its victims into getting infected. Once they click on the harmful transmitter, the Trojan would normally find some weakness in the system (such as the absence of reliable antivirus software, a disabled firewall, outdated virus definitions etc.) and will insert its harmful code without any visible indications. That’s why, it is extremely important for the web users to invest in reliable antivirus protection and use trusted security tools in order to prevent “I Hacked This Mailbox More Than Six Months Ago” and other similar threats from finding vulnerabilities in the system. In fact, in most of the cases, such an infection should be effectively intercepted by a strong and fully updated antivirus program, which would then suggest effective ways of having the malware removed. Without antivirus protection, however, the malware might be really difficult to spot and safely removed. A detailed Removal Guide like the one on this page might also be helpful if you don’t have a reliable security tool at your disposal but the manual removal of the Trojan will require your full attention and some computing experience in order to effectively take care of the problem.

The criminals could use “I Hacked This Mailbox More Than Six Months Ago” for various criminal deeds!

The main reason to fear Trojans is the fact that you could never know what kind of harm you could expect from them. Will they steal your personal data, spy on you, hack into your online profiles, corrupt your files or crash the system? That is totally up to the crooks that are in control of the infection. Threats like “I Hacked This Mailbox More Than Six Months Ago” could be programmed to destroy the system or to provide their creators with remote access to the targeted PC with the same ease with which it could insert a Ransomware, a Spyware or another nasty virus inside the infected system. The general conclusion is that Trojans like “I Hacked This Mailbox More Than Six Months Ago” are extremely versatile and sophisticated tools for online theft, fraud and personalized abuse of the web users. That’s why, the best you could do if you have one on such infection in your system is to remove it immediately. If you don’t, then no one can really tell you the scale of the damage that you may face. The hackers may gain full control over the infected machine, launch various criminal processes in the background, turn the PC into a bot and use it for spam and virus distribution or even harm you personally by exploiting any private information that they might get their hands on.


Name “I Hacked This Mailbox More Than Six Months Ago”
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms System errors, crashes, unresponsiveness and unusual activities might eventually indicate the presence of the Trojan.
Distribution Method  Various misleading links, infected webpages, fake ads, torrents, pirated content, contaminated software installers. 
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment