Remove 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ Bitcoin Email

How irritating is this problem? (4 votes, average: 5.00)

This page aims to help you remove 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ. Our removal instructions work for every version of Windows.

If you recieve an email with follow content:

“Hello! I’m a programmer who cracked your email and device a few months ago. You entered a pass on one of the sites you visited, and I intercepted it. This is your password from **** on moment of hack: ***** But it doesn’t matter, my malware updated it every time. Also I installed a Trojan on your device and long tome spying for you. Therefore, I expect payment from you for my silence. I think $847 is an acceptable price for it! Pay via Bitcoin. My BTC wallet: 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ I give you 2 days (48 hours) to make a payment.”

More likely this is a scam, but it also shows that you must check about some kind of malware on your device.

One of the main reasons why PC users get their machines infected by different types of malware is their lack of understanding and awareness with regards to the potential cyber hazards they might face on the Internet. System vulnerabilities are oftentimes used for facilitating the distribution of virus programs but the main tool that the hackers rely on when it comes to spreading their malicious cyber infections is the users’ lack of care and awareness. This is why being well informed with regards to the nature of the potential threats you might face while browsing the World Wide Web is so essential and it is also why we try our best to tell our readers about the latest and most dangerous or problematic forms of malware that they could come across on the Internet. Today, our focus will be the noxious 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ Trojan Horse. You’ve surely already heard about the Trojan Horse malware category. After all, how couldn’t you have? This type of malware infections are very widespread and they are known for targeting all kinds of devices – from Windows PCs and laptops to Android devices and even iPhones and Mac machines. 

Remove 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ 

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

This makes the Trojan category one of the most commonly encountered types of malware and it’s easy to see why pretty much all computer users have at least heard about them. This, however, is not all – Trojans are also really sneaky and versatile. They can target your data, corrupt your computer system, take control over the processes in the machine, insert more malware programs like nasty Ransomware cryptoviruses and Rootkits and all of this is barely the tip of the iceberg. If you think that 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ might have sneaked inside your computer, we strongly advise you to carefully look and read the steps from the removal guide below and then apply them on your computer in order to eliminate the insidious threat.

Depending on your specific case, the guide may or may not be enough to resolve everything. In case you’ve completed all of the steps and the malware didn’t entirely go away or in case you don’t think you can finish the whole guide all by yourself, we can offer you an alternative solution in the form of the removal tool from this page. You can find the said tool in the guide and use it in combination with the guide or separately – it should be able to take care of 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ and make your computer safe once again.

The stealth of a Trojan

Threats such as 1LZQGS99RUCvQvT5Qce7LkrWtMtcXPSdWZ use different kinds of disguise that allow them to sneak inside any system without raising any red flags. Normally, you can expect a Trojan to be hidden inside a pirated program download, inside a fake spam online message or inside some misleading and deceitful online ad or download request. This, however, are only some of the most commonly used methods for Trojan Horse distribution. If you really want to stay safe, we also advise you to get a reliable antivirus program which will further boost the protection levels of your PC.


Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Unusual PC behavior, frequent errors and crashes, slow-downs and unknown processes in your Task Manager can all be potentially related to a Trojan Horse infection.
Distribution Method Unsafe and questionable sites, pirated software, fake ads and online offers, different forms of spam, etc.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment