How to remove "On this day i hacked your os and got full access to your account" virus

A few days ago, people started to receive message with scared text about somebody who cracked their site or computer, or account. This e-mail contains a fake password from the other forum or website with contact form. It is really dangerous for people who use one password on all devices and all accounts. In this case, user needs to change all important passwords and try to find Trojans in the system. This is a short entry on how to get rid of virus. Here we have described all that you have to realize about Trojan utilities: security tricks, the ways of penetration and elimination techniques. We will hook you up with easy elimination instructions and tell you how to act to forget about Trojans forever.


Trojan trojan


Trojans are very hazardous, and commonly, when users call anything a virus - it's a Trojan. These tricky viruses are cross-functional, speedy and sneaky so that scammers could use them for almost any malicious aim that you can imagine. Trojan virus is not an exception. Having it in the system means that someday it will begin working aggressively, and the machine might suffer harm. In our article, we have gathered all data, which might be useful for you to locate a Trojan and erase it. Except that we will teach you what Trojan is and the strategies via which you can protect the machine from other similar Trojans.

What is Trojan

Trojan is a utility that is capable of doing literally everything. Of course, it can’t bake a cake for you, but it is capable of doing lots of nasty things to the PC. Commonly, it all begins with the theft of sensitive info. It’s the basic function, and all Trojans are doing it all the time. These utilities sneak into the computer, crawl into its depths and struggle to stay concealed for as long as it's possible. The sensitive information ranges from the history of search requests to registration data, and it is pretty much precious for scammers. Trojan easily saves it and gives to fraudsters, without any visible activity. The Trojan can stay like this for years, but occasionally, it’s forced to act, to complete some other tasks. Here we've gathered the very usual aims:


  • Trojan helps other viruses to get into the system. They simply can’t get into the system independently, and they rely on Trojan viruses. Trojan decreases the system protection and assists them to get in. In this case, it will be something serious.
  • Attaching the PC to a botnet. By botnet, we mean a huge network of PC's and smart machines that are working under the control of scammers. Commonly, their operators don’t have a clue that they are a part of something like that. Botnets are applied to fulfill informational attacks on web pages and send viral content.
  • Cryptocurrency production. Mining is the sort of activity, where the price of electricity and the amortization of devices are the main criteria. If you don’t apply your machine to mine, and some other guy pays the bills, mining appears to be an extremely attractive industry. Naturally, with Trojan miners, you are the one who pays for all the process, and scammers do nothing except counting their money.
  • Involving your PC into doubtful actions. This option is the least favorable for the customer: hackers might commit a cyber-crime using your machine. You do not see such things every day, but the victims were not so happy about it.


All these things are too hazardous to neglect them since if a Trojan does them – Trojan uninstalling will become an easiest issue for you. The only technique to avoid that is to eliminate Trojan until Trojan hits the fan.


The Trojan’s distinctive trait is furtivity. This program was developed not to get caught, and if you have managed to detect it – we can think of two variants: either you are an extremely experienced user, or something went bad so that Trojan needed to take measures about it. Swindlers are very clever and prepare their viruses to interact with the highly well-known utilities. Regretfully for scammers, they cannot overthink all existing examples of tools, and in some cases Trojans simply aren't functioning, when some particular software is present in your system. It brings sudden turn-offs, lagging, BSOD's and critical mistakes. Most likely that’s how you have understood that the PC is infected and you'd better do something to refine it.

How to protect the system against Trojans



To scare viruses off the laptop, you only should do lots of things. You hoped it wouldn't be a problem, huh? Unfortunately, not. This sort of protection cannot be achieved easily, since you'll need not only the effective anti-virus but the alteration of your customs on the Internet. You shouldn't attend infected sites, refrain from using unlicensed content, stop clicking on each link that's being displayed on your screen and installing software proposed with the help of aggressive ads. This advice will help you increase your system’s protection for years.

How to remove Trojan


We're aware of a single good method to remove Trojan virus. To achieve the best results, you should manually uninstall the Trojan's files and then launch the removing process through an antivirus, to make sure that everything’s good. The procedure consists of entering in the safe mode, deleting the viral strings from the registry and manually removing Trojan's files from hard drive. Below this paragraph, you’ll find the useful hints, and you should follow them, as failures might bring devastating consequences.

Removal instruction

Step 1. Boot the system into safe mode

  • Press Start
  • Type Msconfig and press Enter

Safe mode. Step 1


  • Select Boot tab

Safe mode. Step 2



  • Select Safe boot and press Ok

More information about Safe mode: What is Safe Mode and how to boot computer in Safe Mode


Step 2. Show all hidden files and folders

  • Press Start
  • Click on Control Panel

Show hidden files. Step 1


  • Select Appearance and Personalization

Show hidden files. Step 2


  • Click on Folder Options
  • Select View tab
  • Select Show hidden files, folders and drives

Show hidden files. Step 3


  • Press Ok


Step 3. Remove virus files


Check next folders to find suspicious files:

  • %TEMP%
  • %ProgramData%


Step 4. Fix hosts file

  • Go to %SystemRoot%\System32\drivers\etc\ folder



  • Open hosts file using Notepad or other text editor
  • Delete suspicious elements
  • Basic hosts file looks like this:



Step 5. Clean registry (for experienced users)

  • Click Start
  • Type Regedit.exe and press Enter
  • Clean startup registry keys
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit

Step 6. Scan the computer with antivirus


When you're done with the manual part, you only need to get Spyhunter anti-viral utility, establish it and scan the hard drive. We're sure you're interested why we suggest Spyhunter? The answer is simple: it’s more efficient, more trusted and faster than the opponent’s software, and costs much less than them. You can get Spyhunter's trial variant by pushing the button under this section. You may scan your computer with its help to test Spyhunter’s strength.


Special Offer

Download Spyhunter - Anti-malware scanner

We advise downloading SpyHunter to see, if it can detect malware for you.

Spyhunter has a biggest malware database

It protects the system against all kinds of threats: Trojans, adware and hijackers

24/7 Free Support Team

SpyHunter scanner detects threats and malware for free, but to remove infected elements you need to purchase a full version of program for 39.99$. More information about Spyhunter, EULA and Privacy policy.


Step 7. Disable Safe Mode and restart computer

  • Press Start
  • Type Msconfig and press Enter
  • Select Boot tab
  • Remove the check near Safe boot


Video with trojan virus





Share your feedback to help other people
1 1 1 1 1 1 1 1 1 1 Rating 0.00 [0 Votes]

Add comment

Security code



Acronis suggestion to CrashPlans users

Around a month ago, there was an accident with CrashPlans backup software.

What is MicTrayDebugger and is it dangerous

This is a brief entry about MicTrayDebugger: what is it, how it appeared in the system, is it dangerous and how to get rid of it.

What is HoeflerText and is it dangerous?


This article is dedicated to the fraud scheme that is called HoeflerText font wasn't found. We will explain you what is this scheme and how to avoid it.

What is Wpad.dat virus and how it is used

The topic of our today's article is a script that had been unjustly called a virus. It’s Wpad.dat, and it is not a virus. We will explain what is Wpad.dat and how to prevent fraudsters to deceive yourself with its help.


Cancer virus trollware

This is an article about crazy Cancer virus and the madness that it brings to victim's computer.

This website uses cookies to improve your experience