This page aims to help you remove the Virus. Our removal instructions work for every version of Windows.

Our users reported that they received a malicious link in their Facebook Messenger. The message states ” Is this video yours?” with the virus link in it. It will redirect you to a “Facebook Page” where it would ask you for your credentials. Do NOT type anything in there, because the virus will steal all your Facebook information and details about you.

What is the Virus?

The Virus will spam your friends on Facebook if you have received the same virus

What is and how can one remove it? If this is the question that brought you to this page, then, in the next lines, you will find some important information about the nature of this infection. What is more, our “How to remove” team has prepared a detailed removal guide below which is dedicated to helping you detect and delete in a fast and reliable manner. This is very important because this program is a representative of the Trojan Horse family, and dealing with it quickly and effectively can be the difference between a safe and sound computer and a damaged one. is a creation of people with malicious intentions. This program has malicious features that can cause various types of harm. Once it nests inside your system, the malware may secretly collect various types of sensitive data, keep tabs on your keystrokes, hack into your webcam or mic, modify, delete and corrupt different files on your system, and even insert other malware such as Ransomware or Rootkits without your knowledge.

In addition, may screen the victim’s desktop, access the personal data of its victims and obtain sensitive personal information. Any such personal data collected in this way may later be used in various criminal schemes and agendas. Keep in mind that the cybercriminals pursue the greatest possible benefit. Therefore, they can use the obtained personal and sensitive information for a variety of crimes, including blackmailing, money theft, banking fraud and more. All in all, the presence of a Trojan can lead to serious privacy problems and severe system damage. Therefore, if you have recently opened some suspicious attachment added to a junk mail and believe that your system may be infected, we advise you to scan the system with a professional malware removal tool and remove all detected threats.

How can infect you?

According to research, the criminal developers spread Trojan infections in spam email campaigns, malicious advertisements, cracked software, torrents, and compromised websites. However, of all the different distribution methods, the spam emails are some of the most effective and widely-used ones. Typically, the users receive random emails with misleading messages that encourage them to open the attached data. Once opened, those attachments secretly download and install the Trojan without showing any visible indications and without asking for any kind of approval from the user’s side. This way, the malware sneaks in the system unnoticed and gets down to its dirty business.

How can you prevent malicious programs from getting installed in the computer?

The main reasons why so many computers get infected with Trojans are the lack of knowledge and caution in the users, as well as the absence of reliable anti-malware protection. Therefore, the key to safety is caution and prevention. Start with paying more attention when surfing the internet. Think twice before opening attachments in spam emails, or in e-mails coming from suspicious email addresses. The next safety tip is to always have a reliable antivirus and antispyware solution installed and running.

Remove the infection instantly:

Eliminating Trojan threats manually can be a long and tedious process that requires some computing experience at the very least. Therefore, if you think your computer is infected with, we recommend running a scan with the professional removal tool below to delete the malware automatically. Of course, if you think you can manage with the manual removal, you can follow the instructions in the guide. Just make sure you detect the correct malicious files, as deleting the wrong ones may lead to system corruption.


Type Trojan
Detection Tool

anti-malware offerOFFER *Read more details in the first ad on this page, EULA, Privacy Policy, and full terms for Free Remover.

Remove Virus

You are dealing with a malware infection that can restore itself unless you remove its core files. We are sending you to another page with a removal guide that gets regularly updated. It covers in-depth instructions on how to:
1. Locate and scan malicious processes in your task manager.
2. Identify in your Control panel any programs installed with the malware, and how to remove them. Search Marquis is a high-profile hijacker that gets installed with a lot of malware.
3. How to clean up and reset your browser to its original settings without the malware returning.
You can find the removal guide here.

For mobile devices refer to these guides instead: Android, iPhone


About the author


Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

1 Comment

  • Someone Been Trying To use My Email And Google account please Help stop this Hacker Thank You. Already Reach Out to The Hackers &Virse Support Teams

Leave a Comment

We are here to help! Use SpyHunter to remove malware in under 15 minutes.

Not Your OS? Download for Windows® and Mac®.

* See Free Trial offer details and alternative Free offer here.

** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

Spyware Helpdesk 1