You have 46 Hours Email

Parasite may reinstall itself multiple times if you don't delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your time to about 15 minutes. 

Download SpyHunter Anti-Malware

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

The You have 46 Hours Email

The You have 46 Hours is email spam that aims to threaten email recipients that they have a break in their account. The You have 46 Hours email campaign is also known as an email sextortion scam. The perpetrators behind the You have 46 Hours email use intimidation to threaten to potentially release sensitive personal information.

You have 46 Hours

You have 46 Hours Email

One of the Trojan Horse category’s recent versions, a malware program named You have 46 Hours, has been terrorizing the web users, and some of them have reached out to our “How to remove” team with a request to assist in the struggle against this dreadful piece of malware. Therefore, in this article, we are going to try to explain some of the things you can can expect from this malware, and what you can do to protect your system in the future. But even more importantly, and what’s likely the most urgent issue for you right now, we’ll give you a set of comprehensive instructions on how to remove You have 46 Hours from your system. You can find them just below this post, in the removal manual that follows it.

You have 46 Hours

The You have 46 Hours Scam is a scare email campaign aimed at extorting money. The You have 46 Hours scam suggests that your passwords are compromised and you have to pay a ransom to prevent leaky personal data. However, the You have 46 Hours email is just a scam.

The You have 46 Hours email lets you know you are infected:

You have 46 Hours in order to make the payment. (I have a Facebook pixel in this email, and at this moment I know that you have read through this email message). If I do not get the Bitcoin, I will certainly send out your files and video recording to all your contacts including relatives, coworkers and all contacts. Having said that, if I receive the payment, I’ll destroy all files and videos immediately. If you need evidence, reply with “Yes” and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, Don’t waste my personal time and your by responding to this message.

I’m a Hacker who cracked your devices. I set up a malware on the adult video (p0rn) website and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your internet browser started out functioning as an “HRDP” Hidden Remote Desktop Protocol which gave me accessibility to your screen and web camera. After that, my software program obtained all your contacts and files.

What did I do?
I generated a backup of your every system (private document files, video, photos, all files). I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste hahaha), and 2nd part shows the recording of your webcam. All your data is already uploaded to a remote server. Do not try to contact me. Various security services will not help you; formatting a disk or destroying a device will not help either since your data is already on a remote server.

Exactly what should you do?
Well, in my opinion, 500 (USD) Dollars is a fair price for our little secret. You’ll make the payment by Bitcoin (search “Bitcoin Wallet” in Application Store then Download and Install it) Make a deposit to your wallet. After that, transfer it to my wallet.
My Bitcoin (BTC) wallet address: 👉 1KxcLRkaN9hfx3dZWurCNKbKhYsHzxa7xR 👈

(It is case sensitive, Bitcoin wallet address Beginning with 1 and ending with R).

The Trojan Horse infections are universal computer threats, that have the ability to harm their victims in a wide range of ways. That’s what makes them such a common choice for many hackers, and cyber criminals around the globe. Unfortunately, due to their versatile nature, we can’t accurately identify the type of risk you’re facing with an infection like You have 46 Hours inside your system.
Trojans like this one are masters of user espionage, as they can carry out many activities that would allow the criminals behind them to keep track of their victims remotely. One way they can do that is by hacking into your webcam or your microphone. Other techniques for espionage, and data theft can involve keylogging, or secret data transmitting to remote servers. With the help of such techniques initiated by the Trojan, the criminals can see everything that you do on your computer, as well as all the information that you type, see, or share. Needless to say, very delicate data such as passwords, online banking details, and more can be secretly handed over to the criminals that are behind the nefarious piece of malware.

The Final Warning You have 46 Hours Scam

The Final Warning You have 46 Hours is an email scam designed to intimidate Internet users into believing that their respective systems have been compromised and that the intruder has sensitive information about the person concerned. Final Warning You have 46 Hours  is also referred to as a spoof scam due to the nature of the threat behind it.

With all that we’ve just said in mind, you should know that we have merely scratched the surface of what the Trojan Horse infections can do. Threats like You have 46 Hours are usually extremely stealthy, and in many cases they can operate unnoticed for months, if not more, before the victims detect them. So, it’s very fortunate you’ve actually been able to spot the You have 46 Hours virus on your system, and can now take actions to remove it. Once you deal with the Trojan, however, you should also be sure to take care of the safety of your computer. This implies investing in some adequate security software that could block, and alert you in case such malware is trying to attack you. But you should also apply some basic Internet safety rules to your day-to-day browsing, as even the strongest antivirus program won’t be able to protect you if you go looking for trouble. Therefore, we advise you to avoid suspicious web content, and shady-looking web pages. Try not to click on click-baits, random online advertisements, and messages that may pop up every now and then on your screen, as these can often be used as malware transmitters.


Name You have 46 Hours
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Typically, the Trojans lack visible symptoms and are hard to detect without specialized software.
Distribution Method  Spam and malicious emails attachments are common distribution methods for this malware.
Detection Tool

Remove You have 46 Hours Email

If you are looking for a way to remove You have 46 Hours you can try this:

  1. Click on the Start button in the bottom left corner of your Windows OS.
  2. Go to Control Panel -> Programs and Features -> Uninstall a Program.
  3. Search for You have 46 Hours and any other unfamiliar programs.
  4. Uninstall You have 46 Hours as well as other suspicious programs.

Note that this might not get rid of You have 46 Hours completely. For more detailed removal instructions follow the guide below.

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. We recommend downloading SpyHunter to see if it can detect parasite files for you.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

If you want to avoid the risk, we recommend downloading SpyHunter
a professional malware removal tool.

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment