Remove 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 Bitcoin Email Virus

How irritating is this problem? (5 votes, average: 5.00)

This page aims to help you remove 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 Bitcoin Email Virus. Our removal instructions work for every version of Windows.

Our users reported an email that they have received, stating the following:


I am a hacker who has access to your operating system.
I also have full access to your account: At the time of hacking your account(********) had this password: ******

You can say: this is my, but old password!
Or: I can change my password at any time!

Of course! You will be right,
but the fact is that when you change the password, my malicious code every time saved a new one!

I’ve been watching you for a few months now.
But the fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

I also have access to all your contacts and all your correspondence from e-mail and messangers.

Why your antivirus did not detect my malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.

I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this, transfer the amount of $764 to my bitcoin address (if you do not know how to do this, write to g/oo/gle: “Buy Bitcoin”).

My bitcoin address (BTC Wallet) is: 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4

After receiving the payment, I will delete the video and you will never hear me again.
I give you 48 hours to pay.
I have a notice reading this letter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
And please do not try to answer me (the sender’s address is automatically generated).
I do not make any mistakes!

If I find that you have shared this message with someone else, the video will be immediately distributed.

 Multiple antivirus programs have detected the Trojan using 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 Bitcoin Wallet. You can see the attachment from VirusTotal below:

Any potential sign of a Trojan Horse infection inside your computer should be closely examined and should draw your attention because, if there really is a Trojan within your system, the damage caused by it can be devastating. Unfortunately, the symptoms of a Trojan Horse attack may vary greatly and, what’s even worse is that in many cases, there may actually be no visible infection signs. Still, if you notice that your computer has started to behave in an odd way, to frequently crash, to use a lot of RAM and processor time or to experience some unknown and unexpected errors, then you should definitely investigate the reason behind these issues. In a lot of cases, the causes for such unusual system behavior may be unrelated to a Trojan Horse infection – crashes can be caused by hardware failure, errors can come from bugs in legitimate software and high use of the system resources may also be due to unexpected bugs within different programs. However, it’s always important to know whether or not you have a Trojan Horse in your system and, if you do, how to remove it from the machine.

Since you are here, we assume that you at the very least suspect that a malicious Trojan infection named 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 Bitcoin Email has entered your computer and is currently messing with its system and data. If that is indeed the case, then you need to know that 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 is a really serious threat and must not be underestimated. It’s criminal abilities could be many – from data corruption to espionage activities, from theft of important user-related data to Ransomware distribution. All of those are things that Trojan Horse threats can be used for and since the data available on 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 is still rather scarce as this Trojan is quite new, we cannot definitely say what the exact goal of the malware would be in your particular case. Something that we can say with certainty, though, is that it is of utmost importance that you manage to eliminate the infection and all files, registry keys and other items that may be related to it.

The removal of 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 and the future safety of your machine

If you closely follow the guide that you will see below, you should stand a chance of removing the infection and preventing the malware from causing further damage. We do not know how long the malware has been in your system, nor do we know what it has tried and managed to complete. Nevertheless, you must still remove it in order to minimize the harm caused by it. To help you with the removal, we’ve also added a trusted anti-malware program in the manual guide and we advise you to use its help in combination with the manual steps, as the latter may not always be enough to solve everything.

As far as the future security of your machine is concerned, the suggested anti-malware tool should help you keep your machine safe. However, you cannot simply rely on that as the sole precaution against future malware attacks. For that reason, you must never visit sketchy sites, open obscure e-mails, ads and other forms of spam or download unreliable software if you wish to keep your system and data safe and intact.


Name 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms   The viruses of this category can cause different forms of system disturbances including crashes to BSOD, errors of different software on your computer as well as freezes and severe slow-downs.
Distribution Method Pirated programs oftentimes carry programs. Illegal and unreliable websites and spam letters may also be used for Trojan Horse distribution.
Detection Tool

Remove 1Jr1BeJryvonjMXi5su6PieTAdFAfYPgE4 Bitcoin Email Virus

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment