"ERROR # 0x6a4-0xf9fx3999" scam removal instructions
What is the "ERROR # 0x6a4-0xf9fx3999" scam?
"ERROR # 0x6a4-0xf9fx3999" is a technical support scam, run on various deceptive websites. This scheme has been observed being promoted via Microsoft Azure website-hosting platform. At the time of research, there were two variants of the "ERROR # 0x6a4-0xf9fx3999" scam, text-wise both are practically identical. The scheme is presented as an alert from Microsoft and it claims that users' devices have been infected and if the deceptive page is closed - their computers will be blocked to prevent further damage. It must be emphasized that "ERROR # 0x6a4-0xf9fx3999" is a scam and it is in no way associated with the actual Microsoft Corporation. Typically, sites that promote schemes are accessed through mistyped URLs, redirects caused by intrusive advertisements or by PUAs (Potentially Unwanted Applications). These apps do not need express user permission to be installed onto systems and can have various harmful abilities.
When a webpage promoting "ERROR # 0x6a4-0xf9fx3999" scam is accessed, visitors are presented with a pop-up window. The message therein is disguised as an important alert from Microsoft. It urges users not to ignore the warning and to call the provided toll-free number. Visitors are warned that if this page is closed, their devices will supposedly be blocked to prevent further damage. The computers are allegedly infected with "Storm Worm and Riskware". The nonexistent malware infections are putting users' social media and email account log-ins credentials (i.e. IDs, usernames and passwords), banking account details, and stored images - at risk. The scheme pushes users to call the "helpline" - in order to be instructed on how to eliminate the fake infections. The text presented in the background page simply repeats what is stated in the pop-up. Scammers use this type of schemes variously. They often attempt to gain access to victims' devices, which they then can infect with genuine malware, e.g. with Remote Access Trojan (RATs) to ensure indefinite and stealthy access and control over them, other types of trojans, ransomware, cryptominers, and so on. Cyber criminals also target a variety of sensitive data, such as: content stored on the device, communication (e.g. email, social networking/media, messenger, etc.) and financial (e.g. e-commerce, online money transferring, cryptocurrency, banking, etc.) accounts, names, addresses, credit card details, and so forth. Scammers can obtain this information by tricking victims into revealing it, extracting it from their computers and/or through phishing websites. Furthermore, the "services" offered by scammers are usually extraordinarily expensive. In summary, trusting "ERROR # 0x6a4-0xf9fx3999" and similar scams can result in system infections, financial losses, severe privacy issues and even identity theft. Should it be impossible to close a deceptive site - the Windows Task Manager must be used to end the browser's process. To prevent the website from being reopened next time the browser is open - it is advised not to restore the previous browsing session.
As mentioned in the introduction, deceptive webpages can be accessed via redirects caused by PUAs. Aside from force-opening unreliable and dangerous sites, this software can have other/additional abilities. Adware-types deliver pop-ups, banners, coupons and other intrusive adverts. Once clicked on, the delivered ads redirect to harmful websites and some can even stealthily download/install software (e.g. PUAs). Browser hijackers are another type of unwanted applications, they operate by making modifications to browser settings and restricting/denying access to them - in order to promote fake search engines. What is more, most PUAs spy on users' browsing activity. Information of interest includes: browsing and search engine histories, IP addresses, geolocations and other details. Therefore, to ensure device and user safety - all suspicious applications and browser extensions/plug-ins must be removed without delay.
|Name||ERROR # 0x6a4-0xf9fx3999 tech support scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Fake Claim||Scam claims users' devices are infected and may be blocked to prevent further damage|
|Tech Support Scammer Phone Number||+1-844-311-7591|
|Symptoms||Fake error messages, fake system warnings, pop-up errors, hoax computer scan.|
|Distribution methods||Compromised websites, rogue online pop-up ads, potentially unwanted applications.|
|Damage||Loss of sensitive private information, monetary loss, identity theft, possible malware infections.|
|Malware Removal (Windows)||
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Malwarebytes.
"Activation Failed! (Error Code 001)", "Windows Error Code: DLL011150", "Error Code : EBRX1:6X76D", "Covid19 Warning Alert" - are some examples of other tech support scams. There are thousands of schemes online and they use different techniques to lure victims. Popular scam models include: warnings that the system is infected or at risk, alerts that a crucial piece of software is outdated or missing, fake prize giveaways, unbelievable offers, etc. Regardless of what scams offer, claim, request or demand, the end-goal is the same - to generate profit to the scammers / cyber criminals behind them.
How did potentially unwanted applications install on my computer?
Select PUAs have "official" download pages, which are often promoted by deceptive/scam ones. These applications are also distributed through download/installation setups of other programs. This false marketing technique is called "bundling". Rushed download/installation processes (e.g. ignored terms, skipped steps, used "Quick/Express" settings, etc.) - increase the risk of inadvertently allowing bundled content into the system. Upon being clicked, intrusive ads can execute scripts to download/install PUAs without user consent.
How to avoid installation of potentially unwanted applications?
It is strongly advised to research software before download/installation and/or purchase. All downloads must be done from official and verified sources. Since untrustworthy channels, e.g. unofficial and free file-hosting websites, Peer-to-Peer sharing networks and other third party downloaders - commonly offer bundled and/or harmful content. When downloading/installing, it is recommended to read terms, explore all possible options, use the "Custom/Advanced" settings and opt-out from additional apps, tools, features, etc. It is just as important to exercise caution when browsing. Intrusive adverts appear legitimate, however they redirect to highly questionable webpages (e.g. gambling, pornography, adult-dating, and so on). In case of encounters with such advertisements and/or redirects, the system must be checked and all suspect applications and browser extensions/plug-ins - immediately removed from it. If your computer is already infected with PUAs, we recommend running a scan with Malwarebytes for Windows to automatically eliminate them.
Text presented in the "ERROR # 0x6a4-0xf9fx3999" scam:
** Microsoft Important Alert **
ERROR # 0x6a4-0xf9fx3999(3)
Call us immediately at: +1-844-311-7591 .
Don't ignore this alert..
If you close this page, your computer login will be disabled to prevent further damage to our Internet. Your computer has warned us that it has been infected with a Storm Worm and Riskware.
The following information is at risk:
1.Social Media Logins
2.Bank Account Details
3.Email Account Logins
4.Images stored on this computer.
You must contact us now so that our engineers can walk you through the removal process over the phone or via Remote Access to protect your identity and computer. Please call us within the next 1 minute to prevent your computer from being shut down and from any identity theft or information loss.
** MicroSoft Alert **
ERROR # 0x6a4-0xf9fx3999(3)
Please call us immediately at:
+1-844-311-7591 ( Toll Free)
Do not ignore this critical alert.
If you close this page, your computer login will be disabled to prevent further damage to our Internet.
Your computer has warned us that it has been infected with a Storm Worm and Riskware. The following information is being stolen...
1.Social Media Logins
2.Bank Account Details
3.Email Account Login
4.Images stored on this computer
You must contact us now so that our engineers can walk you through the removal process over the phone or via Remote Access to protect your identity and computer.
Call Windows: +1-844-311-7591 (Toll Free)
Screenshot of the alternative "ERROR # 0x6a4-0xf9fx3999" scam variant:
The appearance of "ERROR # 0x6a4-0xf9fx3999" pop-up scam (GIF):
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Malwarebytes is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
- What is "ERROR # 0x6a4-0xf9fx3999"?
- STEP 1. Uninstall deceptive applications using Control Panel.
- STEP 2. Remove rogue extensions from Google Chrome.
- STEP 3. Remove potentially unwanted plug-ins from Mozilla Firefox.
- STEP 4. Remove rogue extensions from Safari.
- STEP 5. Remove rogue plug-ins from Microsoft Edge.
- STEP 6. Remove adware from Internet Explorer.
Removal of potentially unwanted applications:
Windows 7 users:
Click Start (Windows Logo at the bottom left corner of your desktop), choose Control Panel. Locate Programs and click Uninstall a program.
Windows XP users:
Click Start, choose Settings and click Control Panel. Locate and click Add or Remove Programs.
Windows 10 and Windows 8 users:
Right-click in the lower left corner of the screen, in the Quick Access Menu select Control Panel. In the opened window choose Programs and Features.
Mac OSX users:
Click Finder, in the opened screen select Applications. Drag the app from the Applications folder to the Trash (located in your Dock), then right click the Trash icon and select Empty Trash.
In the uninstall programs window, look for any suspicious/recently-installed applications, select these entries and click "Uninstall" or "Remove".
After uninstalling the potentially unwanted application, scan your computer for any remaining unwanted components or possible malware infections. To scan your computer, use recommended malware removal software.
Remove rogue extensions from Internet browsers:
Video showing how to remove potentially unwanted browser add-ons:
Remove malicious extensions from Google Chrome:
Click the Chrome menu icon (at the top right corner of Google Chrome), select "More tools" and click "Extensions". Locate all recently-installed suspicious browser add-ons and remove them.
If you continue to have problems with removal of the error # 0x6a4-0xf9fx3999 tech support scam, reset your Google Chrome browser settings. Click the Chrome menu icon (at the top right corner of Google Chrome) and select Settings. Scroll down to the bottom of the screen. Click the Advanced… link.
After scrolling to the bottom of the screen, click the Reset (Restore settings to their original defaults) button.
In the opened window, confirm that you wish to reset Google Chrome settings to default by clicking the Reset button.
Remove malicious plugins from Mozilla Firefox:
Click the Firefox menu (at the top right corner of the main window), select "Add-ons". Click on "Extensions", in the opened window remove all recently-installed suspicious browser plug-ins.
Computer users who have problems with error # 0x6a4-0xf9fx3999 tech support scam removal can reset their Mozilla Firefox settings.
Open Mozilla Firefox, at the top right corner of the main window, click the Firefox menu, in the opened menu, click Help.
Select Troubleshooting Information.
In the opened window, click the Refresh Firefox button.
In the opened window, confirm that you wish to reset Mozilla Firefox settings to default by clicking the Refresh Firefox button.
Remove malicious extensions from Safari:
Make sure your Safari browser is active, click Safari menu, and select Preferences....
In the opened window click Extensions, locate any recently installed suspicious extension, select it and click Uninstall.
Make sure your Safari browser is active and click on Safari menu. From the drop down menu select Clear History and Website Data...
In the opened window select all history and click the Clear History button.
Remove malicious extensions from Microsoft Edge:
Click the Edge menu icon (at the upper-right corner of Microsoft Edge), select "Extensions". Locate all recently-installed suspicious browser add-ons and click "Remove" below their names.
If you continue to have problems with removal of the error # 0x6a4-0xf9fx3999 tech support scam, reset your Microsoft Edge browser settings. Click the Edge menu icon (at the top right corner of Microsoft Edge) and select Settings.
In the opened settings menu select Reset settings.
Select Restore settings to their default values. In the opened window, confirm that you wish to reset Microsoft Edge settings to default by clicking the Reset button.
- If this did not help, follow these alternative instructions explaining how to reset the Microsoft Edge browser.
Remove malicious add-ons from Internet Explorer:
Click the "gear" icon (at the top right corner of Internet Explorer), select "Manage Add-ons". Look for any recently-installed suspicious browser extensions, select these entries and click "Remove".
If you continue to have problems with removal of the error # 0x6a4-0xf9fx3999 tech support scam, reset your Internet Explorer settings to default.
Windows XP users: Click Start, click Run, in the opened window type inetcpl.cpl In the opened window click the Advanced tab, then click Reset.
Windows Vista and Windows 7 users: Click the Windows logo, in the start search box type inetcpl.cpl and click enter. In the opened window click the Advanced tab, then click Reset.
Windows 8 users: Open Internet Explorer and click the gear icon. Select Internet Options.
In the opened window, select the Advanced tab.
Click the Reset button.
Confirm that you wish to reset Internet Explorer settings to default by clicking the Reset button.
Commonly, adware or potentially unwanted applications infiltrate Internet browsers through free software downloads. Note that the safest source for downloading free software is via developers' websites only. To avoid installation of adware, be very attentive when downloading and installing free software. When installing previously-downloaded free programs, choose the custom or advanced installation options – this step will reveal any potentially unwanted applications listed for installation together with your chosen free program.
If you are experiencing problems while trying to remove error # 0x6a4-0xf9fx3999 tech support scam from your computer, please ask for assistance in our malware support forum.
Post a comment:
If you have additional information on error # 0x6a4-0xf9fx3999 tech support scam or it's removal please share your knowledge in the comments section below.