Remove 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj Bitcoin Email (Feb. 2019 Update)

How irritating is this problem? (4 votes, average: 5.00)

This page aims to help you remove 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj. Our removal instructions work for every version of Windows.

If you recently opened e-mail, stating something like this:

“I’m a hacker who cracked your email and device a few months ago. Through your email, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a Trojan on your device and long tome spying for you. There will be laughter when I send these photos to your contacts! Therefore, I expect payment from you for my silence. I think $876 is an acceptable price for it! Pay with Bitcoin. My BTC wallet: 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj If you do not know how to do this – enter into Google “how to transfer money to a bitcoin wallet”. It is not difficult. After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system. I give you 2 days (48 hours) to make a payment. Farewell.”

Then you are most probably a target of an email scam. However it is also very likely that you indeed have a malware on your device and need to take measures to rectify that situation as soon as possible.

If a Trojan virus named 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj has somehow managed to infect your computer, then you need to be well aware of the options that you currently have and also to have a general idea about the potential capabilities of this insidious threat. Here, we can offer you both so you are advised to spend a couple of minutes on this page, learning more about the nature of this malicious virus and about the things you could do to safe your computer from it. The removal part of this article where we show you how to eliminate 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj and liberate your system from it will come a bit later as we must first give you some overall information about what Trojan Horses are like and what their usual abilities are.

Remove 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Talking about abilities…

Trojans are well known to be some of the more versatile types of malware programs. A spyware will mostly focus on espionage, a Ransomware will try to lock-up your files and use that to blackmail you and a Rootkit will mainly block your security programs so that other viruses could operate without getting detected. A Trojan, however, could oftentimes be used in different ways and employed for different tasks and in many instances its main purpose might be reprogrammed on the go. Data deletion, OS corruption, triggering freezes and crashes, espionage, downloading more viruses inside the computer as well as many others are all things a lot of Trojans might be capable of pulling off. And that’s only the tip of the iceberg – note that many hackers actually use some of the more advanced Trojans out there to take control over their victims’ machines and this, in and of itself, opens so many other possibilities that we can’t list here. The bottom line is, if you have 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj or some other Trojan virus on your PC, be sure to remove it immediately!

Some tips on protection

Now that you have hopefully read our guide and have an idea about how you might possibly be able to remove the malware, we need to tell you something about protecting your computer in the future. The first thing that might come to mind to some of you with regards to the topic of protection against antiviruses is likely getting an antivirus program and while this is certainly an important precaution, it is nowhere near as important as ensuring that you, yourself, are manually keeping your computer safe. The way you can do that is by staying away from anything potentially harmful that you might bump into on the Internet. This includes sketchy web offers and download/update requests, obscure sites and pages, unreliable download sources, questionable messages and e-mails which could be spam and so on. Also, remember that downloading pirated content, aside from being illegal is also potentially dangerous from your system’s health as a lot of hazardous and malicious software components tend to get added inside of illegally distributed software. So, all in all, the best way to prevent any viruses from sneaking inside your computer is constantly being watchful and cautious especially while surfing the net.


Name 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  In some instances, a Trojan might cause your machine to operate slower due to excessive RAM and CPU use and also to experience random errors, crashes and freezes.
Distribution Method Malicious online advertisements, spam messages and e-mails, illegal torrents and pirated software, backdoor viruses, etc.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment