First of all, I will introduce myself.
I am a professional programmer and specialize in hacking in my free time._x000D_
Unfortunately, you are my next victim and I hacked into your operating system and device._x000D_
Ive been observing you for a few months. Simply put, your device went viral while you were visiting your favorite._x000D_
Some people are not well-placed in this situation, so I will explain the current situation in more detail._x000D_
Trojans give me full access and control over your device. Therefore, you can view and access everything on your screen, turn the camera and microphone on and off, and do various other things without your knowing._x000D_
In addition, you have access to all your social networks and contacts on your device._x000D_
I think that you may be wondering why antivirus software did not detect any malicious software until now._x000D_
In fact, my spyware uses special drivers and is frequently rewriting signatures, so it couldnt be caught by your antivirus software._x000D_
On the left side of the screen, youve created a video clip that shows you entertaining yourself, and on the right youre showing the videos you were watching at the time. (including illegal religion, underage pornography, aid dating information, etc.) With just a few mouse clicks, you can transfer it to all your contacts and social media friends. You may be surprised if you upload this video to a public access online platform._x000D_
The good news is that it can still be deterred. Just send 170,000 yen worth of Bitcoin to my BTC wallet and you can stop it (if you dont know how, you should be able to find a lot of articles explaining how to do it step by step by online search)._x000D_
My Bitcoin Wallet (BTC Wallet): 1Gsqpss4uniKHd3FifoBECj387YhkVtk68