Remove 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr Bitcoin Email Virus

How irritating is this problem? (4 votes, average: 5.00)

This page aims to help you remove 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr. Our removal instructions work for every version of Windows.

This article is aiming to help all of you that have received a scary email, stating the following:

“Hi, my victim. I know your password – ******** This is my last warning.I write you inasmuch as I put a trojan on the web page with pornography which you have visited. My malware grabbed all your personal data and switched on your webcam which captured the process of your masturbation. Just after that the trojan saved your contact list. I will remove the compromising video and data if you pay me 700 USD in bitcoin. This is wallet address for payment : 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr I give you 24 hours after you view my message for making the payment. As soon as you view the message I’ll know it right away. It is not necessary to tell me that you have sent money to me. This address is connected to you, my system will delete everything automatically after transfer confirmation. You can visit the police office but no one can’t help you. If you try to cheat me, I’ll see it immediately! I don’t live in your country. So nobody can’t track my location even for 9 months. Don’t forget about the disgrace and to ignore, Your life can be ruined.”

You might be victims of an email scam, but it is also entirely possible that you have a pre-existing malware threat  that needs taking care of.

Removing a Trojan Horse virus from your PC can be a formidable challenge if you are not an experienced PC user and if you do not know what to look for inside your system. In fact, in some cases, even IT professionals with high computing skills might find it difficult to remove such a threat from an infected machine. However, if you currently have 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr or some other Trojan on your computer, then there really aren’t many alternatives. You can either wait idly as the malware carries out its insidious tasks or take action and, with some luck, eliminate the virus. Of course, you are likely going to need some help with that which is the main reason we are writing this article. Here, you can find some general information about the 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr infection and about the Trojan Horse malware class in general as well as a detailed removal manual that will guide you through the process of liberating your machine from the insidious malware program.

Remove 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

We should first tell you something more about the capabilities of those so-called Trojan Horses. Unlike more specialized malware types like Spyware or Ransomware, Trojans such as 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr are actually quite versatile. They tend to have a number of different abilities that can be used together or separately depending on exactly what the hackers who control them seek to achieve. In some cases, a virus of this kind might delete essential data from your HDD and thus corrupt your system and render the PC unusable while in other cases, the purpose of the attack might be more covert and the Trojan might try to silently spy on you or even control certain processes in your computer without showing any symptoms. Regardless of the actual use of the Trojan in each separate case, however, removing the infection is still of utmost importance and this is where the following guide should come in handy.

Be careful in the future

Removing the infection caused by 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr is certainly crucial in order to keep your system healthy and secure but it’s also important to never allow such threats to infiltrate your computer in the future. To achieve that, you should, of course, keep a strong and reliable antivirus solution inside your computer. However, this is usually not enough of a precaution measure on its own to keep your computer reliably defended. An antivirus might still fail to detect some newer infections and this is why you must also ensure that you manually reduce the chances of landing some nasty new virus. The way to do that is by avoiding shady websites and keeping away from any form of web content that might be infected. Suspicious e-mails and potentially spam messages, random ads coming from questionable sources, browser hijacker apps and adware that might have gotten in your browsers and so on and so forth. Also, be sure to avoid downloading pirated content – not only is downloading pirated software illegal but it is also dangerous as many games and other programs that are getting illegally distributed might have nasty viruses and Trojans like 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr in them.


Name 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  If 1MAM6oPcycTrfiLPS9tjtAR8t6KDmL91fr has invaded your computer, it might cause significant productivity slow-downs, frequent errors and freezes and maybe even BSOD crashes, though none of these symptoms are guaranteed to occur.
Distribution Method Some of the most common Trojan Horse distribution techniques are through the use of malicious spam messages with harmful attachments, through unsafe web ads, via pirated program downloads and also, with the help of backdoor malware programs.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment