I know how these scams work. What they do is they try to convince people to give them remote share access to your computer, and then try to scam you out of money or mess up your system and than ask you to pay. I’m thinking of setting of a virtual instance and while they are trying to f up my virtual instance, try to trace back their ip address…..I wonder how hard that would be to do…