How to Remove “Hi perv” Email Scam

An infection with the deceitful “Hi perv” Email scam may be a result of serious security issues. Victims can restore and protect their computers by following our complete removal guide.

Remove “Hi perv” Email Scam and Restore PC
Manual Removal Guide
Skip all steps and download anti-malware tool that will safely scan and clean your PC.

DOWNLOAD Anti-Malware Tool

SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

Note for Mac users!
In case that your Mac has been affected by “Hi perv” Email Scam or you suspect that other threats are running on it you can follow detailed instructions on how to detect and remove Mac viruses so you can keep the device clean and secure.

Distribution of “Hi perv” Email Scam

The “Hi perv” scam is mainly spread with the help of e-mail messages that somehow pass through the spam filters of various email providers. Alternative distribution tactics may be used too. For example, the “Hi perv” scam may be spread across Facebook. It is also possible that scareware tactics and doxing may be applied as well.

Another reason to receive this email is the real contamination of your system. In case your PC was truly compromised, it could have happened after an unnoticed activation of a payload file that downloads a Trojan horse or some kind of a RAT. Such devastating impact may be caused by a visit of any malicious website or redirect.

Impact of “Hi perv” Email Scam

The “Hi perv” email is yet another scam that attempts to steal your money. It has been circling across the web for quite a while. Except email service providers, the scam may also affect various social media sites such as Facebook and Twitter.

The extortionists rely on a deceitful message that forces users to transfer Bitcoin in order to guarantee that hackers won’t reveal details on their online activities. To make it more scary hackers claim that they have managed to hack your camera and recorded you while masturbating.

Even if the email message has its variations, most of the times it reads something like the following:

THIS IS NOT A JOKE – I AM DEAD SERIOUS!

Hi perv,

The last time you visited a p0rnographic website with teens,
you downloaded and installed software I developed.

My program has turned on your camera and recorded
the process of your masturbation.

My software has also downloaded all your email contact lists
and a list of your friends on Facebook.

I have both the ‘Info.mp4′ with your masturbation
as well as a file with all your contacts on my hard drive.

You are very perverted!

If you want me to delete both the files and keep the secret,
you must send me Bitcoin payment. I give you 72 hours for payment.

If you don’t know how to send Bitcoins, visit Google.

Send 2.000 USD to this Bitcoin address immediately:

3BHemWmcpDdoBCgViS5cwpSngkvTs7ENSv
(copy and paste)

1 BTC = 3,580 USD right now, so send exactly 0.568367 BTC
to the address provided above.

Do not try to cheat me!
As soon as you open this Email I will know you opened it.

This Bitcoin address is linked to you only,
so I will know if you sent the correct amount.
When you pay in full, I will remove the files and deactivate my program.

If you don’t send the payment, I will send your masturbation video
to ALL YOUR FRIENDS AND ASSOCIATES from your contact list I hacked.

Here are the payment details again:

Send 0.568367 BTC to this Bitcoin address:

—————————————-
3BHemWmcpDdoBCgViS5cwpSngkvTs7ENSv
—————————————-

You саn visit police but nobody will help you. I know what I am doing.
I don’t live in your country and I know how to stay anonymous.

Don’t try to deceive me – I will know it immediately – my spy ware is
recording all the websites you visit and all keys you press.
If you do – I will send this ugly recording to everyone you know,
including your family.

Don’t cheat me! Don’t forget the shame and if you ignore this message your
life will be ruined.

I am waiting for your Bitcoin payment.

If you need more time to buy and send 0.568367 BTC,
open your notepad and write ’48h plz’.
I will consider giving you another 48 hours before I release the vid.

Anonymous Hacker

In order to buy your privacy and prevent the so-called doxing, you are demanded to pay 0.568367 BTC. However, we advise you to avoid paying criminals before you ensure whether they have really compromised your device or are just trying to scam you. You can do this by scanning your system for malicious files.

Then you should make sure to change all your passwords by using a completely new password for each account. In addition, you could enable two-factor authentication on the accounts that offer this option.

After all, if you believe that your device has been compromised for real, you need to clean it from viruses and keylogging software as soon as possible.

Remove “Hi perv” Email Scam and Restore PC

WARNING! Manual removal of the “Hi perv” Email Scam requires being familiar with system files and registries. Removing important data accidentally can lead to permanent system damage. If you don’t feel comfortable with manual instructions, download a powerful anti-malware tool that will scan your system for malware and clean it safely for you.

DOWNLOAD Anti-Malware Tool

 
SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

“Hi perv” Email Scam – Manual Removal Steps

Start the PC in Safe Mode with Network

This will isolate all files and objects created by the ransomware so they will be removed efficiently. The steps bellow are applicable to all Windows versions.

1. Hit the WIN Key + R

2. A Run window will appear. In it, write msconfig and then press Enter

3. A Configuration box shall appear. In it Choose the tab named Boot

4. Mark Safe Boot option and then go to Network under it to tick it too

5. Apply -> OK

Remove “Hi perv” Email Scam from Windows

Here’s a way to remove the program. This method will work regardless if you’re on Windows 10, 8, 7, Vista or XP. Simply selecting the program and pressing delete won’t work, as it’ll leave a lot of small files. That’s bad because these leftovers can linger on and cause all sorts of problems. The best way to delete a program is to uninstall it. Here’s how you can do that:

1. Hold the “Windows” button (It’s between CTRL and Alt on most keyboards) and press “R”. You’ll see a pop-up window.

run-window-windows

2. In the textbox, type “appwiz.cpl”, then press“ Enter ”.

appwiz-cpl-command-run-windows

3. The “Programs and features” menu should now appear. It’s a list of all the programs installed on the PC. Here you can find the program, select it, and press “Uninstall“.

uninstall-malicious-software-control-panel-programs-features-windows

Remove “Hi perv” Email Scam Virus From Your Browser

Before resetting your browser’s settings, you should know that this action will wipe out all your recorded usernames, passwords, and other types of data. Make sure to save them in some way.

Removal guide for Mozilla Firefox Removal guide for Google Chrome Removal guide for Internet Explorer

    1. Start Mozilla Firefox. In the upper right corner, click on the Open menu icon and select “Add-ons“.
    add-ons-mozilla-removal-browser-hijacker-guide

    2. Inside the Add-ons Manager select “Extensions“. Search the list of extensions for suspicious entries. If you find any, select them and click “Remove“.
    remove-suspicious-extensions-mozilla-removal-browser-hijacker-guide

    3. Click again on the Open menu icon, then click “Options“.
    options-mozilla-firefox-removal-browser-hijacker-guide

    4. In the Options window, under “General” tab, click “Restore to Default“.
    restore-to-default-settings-mozilla-firefox-removal-guide-browser-hijacker

    5. Select “Search” in the left menu, mark the unknown search engine and press “Remove”.
    search-remove-unknown-search-engine-mozilla-firefox-removal-guide-browser-hijacker

    1. Start Google Chrome. On the upper-right corner, there a “Customize and Control” menu icon. Click on it, then click on “Settings“.

    settings-google-chrome-browser-hijacker-removal-guide

    2. Click “Extensions” in the left menu. Then click on the trash bin icon to remove the suspicious extension.
    delete-suspicious-extension-google-chrome-browser-hijacker-removal-guide

    3. Again in the left menu, under Chrome, Click on “Settings“. Go under “On Startup” and set a new page.
    set-new-page-google-chrome-browser-hijacker-removal-guide

    4. Afterward, scroll down to “Search“, click on “Manage search engines“.
    manage-search-engines-google-chrome-browser-hijacker-removal-guide

    5. In the default search settings list, find the unknown search engine and click on “X“. Then select your search engine of choice and click “Make default“. When you are ready click “Done” button in the right bottom corner.

1. Start Internet Explorer. Go to the “Tools” menu and click on “Manage add-ons“.
manage-add-ons-internet-explorer-removal-browser-hijacker-bestsecuritysearch

2. In the “Manage add-ons” window, bellow “Add-on Types“, select “Toolbars and Extensions“. If you see a suspicious toolbar, select it and click “Remove“.
remove-suspicious-toolbars--internet-explorer-removal-browser-hijacker

3. Then again in the “Manage Add-ons” window, in “Add-on Types“, Select “Search Providers“. Chose a search engine and click “Set as default“. Select the unknown search engine and click “Remove and Close”.
search-providers-set-engine-delete-suspicious-internet-explorer-removal-browser-hijacker

4. Open the Tools menu, select “Internet Options”.
internet-options-internet-explorer-removal-browser-hijacker

5. In the “General” tab, in “Home page”, enter your preferred page. Click “Apply” and “OK”.
enter-preferred-homepage-internet-explorer-removal-browser-hijacker

Repair Windows Registry

1. Again type simultaneously the WIN Key + R key combination

2. In the box, write regedit and hit Enter

3. Type the CTRL+ F and then write the malicious name in the search type field to locate the malicious executable

4. In case you have discovered registry keys and values related to the name, you should delete them, but be careful not to delete legitimate keys

Click for more information about Windows Registry and further repair help

Preventive Security Measures

  • Enable and properly configure your Firewall.
  • Install and maintain reliable anti-malware software.
  • Secure your web browser.
  • Check regularly for available software updates and apply them.
  • Disable macros in Office documents.
  • Use strong passwords.
  • Don’t open attachments or click on links unless you’re certain they’re safe.
  • Backup regularly your data.
  • Was this content helpful?

    Tags:

    Author : Gergana Ivanova

    Gergana Ivanova is a computer security enthusiast who enjoys presenting the latest issues related to cyber security. By doing thorough researches and sharing them on BestSecuritySearch, she hopes that more victims of malware infections will be able to secure their corrupted computer systems properly and eventually recover lost files.

    Leave a Reply

    Your email address will not be published. Required fields are marked *