Your computer was infected with my malware Email

Your computer was infected with my malware

“Your computer was infected with my malware” is new malware threat identified by cyber security researchers as a Trojan horse virus. “Your computer was infected with my malware” is therefore very dangerous and capable of causing extensive damage on the infected machine.

Your computer was infected with my malware

The “Your computer was infected with my malware” Email is designed to scare users.

The Internet is full of different types of computer threats. Some are programmed to corrupt your system and damage your data, others target your personal information and try to steal it and there are even threats that can secretly monitor all of your activities, launch different kinds of harmful processes on the computer and blackmail you. ransomware, spyware, rootkits and Trojans are some of the most widespread infections that the web users may encounter but on this page, we will focus on one specific type of a Trojan, which has recently been found to target the mailboxes of hundreds of users.

Many of our users reported to us about an ongoing email spam with the following message:

Hey …

Your computer was infected with my malware!

Your password for this mail: … — Evidence that I own all the information.

I am a programmer and hacked your computer 1 months ago.
I kept saving information all the time, such as: browsing history, screen recordings, contacts, messages and much more.

I already wanted to forget you, but recently i saw something interesting on your desktop.
I’m talking about the day you visited a porn site. I decided to record video from the webcam and desktop. Now I have a video of you masturbating yourself.

I have already written down all your contacts from the address book.
All contacts from friends, acquaintances, relatives. All this will be with me.

I am ready to forget about all this and completely stop accessing your computer and email.
I guarantee I will not send these videos and delete all archives with them.
After that I will leave and no longer bother you, but for that I want to have $500 worth of bitcoins in my wallet. You have 48 hours after reading this email.
I still control your email and computer – and I know when you open them and read them.

Don’t try to change your email password, everything is under control.
Do not try to contact me and answer this letter. I sent it to you from your email address.
Take a look at the sender, you will see that I have complete control over your email and your computer.

Bitcoin wallet address:

bc1qu8zhx0xl58nmrqfqqgezf3e3e6vy6rc6w07nzs

If you do not know how to buy bitcoins, you can find information on how to buy bitcoins online. If you need help, you can read several articles about it.

hxxps://localbitcoins.com/guides/how-to-buy-bitcoins
hxxps://www.coinbase.com/buy-bitcoin?locale=en
hxxps://paxful.com/how-to-buy-bitcoin

I look forward to your actions. If you don’t need this data online and with all your friends, send $500 to my wallet BTC. After that I will erase all data and disappear from your life.

Do not be offended by me. If you pay, nothing happens.

The name of the infection is “Your computer was infected with my malware” and it is likely spreading with the help of a viral email Bitcoin scam, which is tricking users into sending money to a specific Bitcoin wallet. “Your computer was infected with my malware” uses a phishing email which is sent from a self-proclaimed hacker, who states that they have captured some sensitive and/or embarrassing information about the user (videos, photos, passwords, etc.) from your machine with the help of this hidden malware. The hacker usually threatens that if you don’t pay a certain amount of money as a ransom, they will use the sensitive data against you or publish it online.

If you have recently received an email with similar content, do not get panicked and do not believe the crook’s claims. In most of the cases, such emails contain false statements and only try to trick the users. However, keep in mind that, sometimes, Trojan horses such as “Your computer was infected with my malware” could be delivered to your system with such messages without your knowledge. That’s why it is definitely a good idea to carefully scan your computer with a reliable anti-malware tool and remove anything potentially malicious. In case your security software detects “Your computer was infected with my malware” on your machine, do not hesitate to use the instructions in the removal guide on this page and remove the threat as soon as possible.

The problem with Trojans

Trojan-based infections are very problematic and are normally quite difficult to deal with. The reason is that they are so versatile and so stealthy that you can never be sure what they will do and where they may hide. Even an experienced user may get tricked by the malware and its camouflaged transmitter and may get their PC infected without realizing it.

And while phishing emails like the ones that are related to “Your computer was infected with my malware” are quite easy to spot, most Trojan carriers cannot be detected without the help of reliable antivirus software. And if not removed in time, such threats can cause a number of issues. They may seriously damage the OS by modifying, corrupting or replacing its vital files, messing up its basic processes or by inserting other malicious code inside (malware programs like ransomware, rootkits and spyware oftentimes get distributed via backdoor Trojans). We already mentioned that a Trojan may also spy on you and steal sensitive information about you, your work, your personal life, your online profiles, banking details and what not. That’s why, if you have a Trojan like “Your computer was infected with my malware” on your PC, you should immediately remove it to prevent it from further messing with your PC and virtual privacy.

SUMMARY:

Name “Your computer was infected with my malware”
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms A strange phishing e-mail may appear in your mailbox, asking you to pay bitcoins to a cryptowallet.
Distribution Method Typically distributed via spam e-mail campaigns, infected links and attachments, malvertising and illegal websites
Detection Tool

anti-malware offerOFFER *Read more details in the first ad on this page, EULA, Privacy Policy, and full terms for Free Remover.

Remove Your computer was infected with my malware Email

If you are looking for a way to remove “Your computer was infected with my malware” you can try this:

  1. Click on the Start button in the bottom left corner of your Windows OS.
  2. Go to Control Panel -> Programs and Features -> Uninstall a Program.
  3. Search for “Your computer was infected with my malware” and any other unfamiliar programs.
  4. Uninstall “Your computer was infected with my malware” as well as other suspicious programs.

Note that this might not get rid of “Your computer was infected with my malware” completely. For more detailed removal instructions follow the guide below.

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Loading
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    After you open their folder, end the processes that are infected, then delete their folders. 

    Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

    Step3

    Hold together the Start Key and R. Type appwiz.cpl –> OK.

    appwiz

    You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

    virus-removal1

    Step4

    To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

    If you want to avoid the risk, we recommend downloading SpyHunter
    a professional malware removal tool.

    More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

    Type msconfig in the search field and hit enter. A window will pop-up:

    msconfig_opt

    Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

    • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

    Hold the Start Key and R –  copy + paste the following and click OK:

    notepad %windir%/system32/Drivers/etc/hosts

    A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

    hosts_opt (1)

    If there are suspicious IPs below “Localhost” – write to us in the comments.

    Step5

    Type Regedit in the windows search field and press Enter.

    Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

    • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
      HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
      HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

    blank

    About the author

    blank

    Violet George

    Violet is an active writer with a passion for all things cyber security. She enjoys helping victims of computer virus infections remove them and successfully deal with the aftermath of the attacks. But most importantly, Violet makes it her priority to spend time educating people on privacy issues and maintaining the safety of their computers. It is her firm belief that by spreading this information, she can empower web users to effectively protect their personal data and their devices from hackers and cybercriminals.

    Leave a Comment