Updated: BTC Ransomware Virus (Removal Steps and Protection Updates)

The BTC ransomware is a new malware threat that has been identified in several live attack campaigns. Learn how to remove infections from your computer by reading our guide.


File Extensions


Solution #1
BTC ransomware can be removed easily with the help of an anti-malware tool, a program that will clean your computer from the virus, remove any additional cyber-security threats, and protect you in the future.

Solution #2
BTC ransomware can be removed manually, though it can be very hard for most home users. See the detailed tutorial below.

The ransomware mainly infects via targeting insecure software via exploit kits

BTC Ransomware — Update August 2019

The BTC ransomware as one of the most well-known and classic virus threats is spread to the intended targets via different hacking groups. Based on its code different versions and variations can be made — one of the easiest way to differentiate between them is to check the email addresses used by the criminals. Two of the widely used ones are [email protected] and [email protected].

One of the newer versions of the threat have been found to have been updated to include a database encrypter. This means that the virus will search for any database files that are found on the host. When they are identified by the engine the encryption will process them as well.

BTC Ransomware Description

Upon infection with the BTC ransomware the virus starts to execute its built-in commands. The detailed security analysis is not yet complete, but we assume that it might replicate itself in some of the operating system folders. Possible locations include the following:

  • %AppData%
  • %Roaming%
  • %Local%
  • %Temp%
  • %SystemDrive%
  • %User’s Profile%

The encryption process is then started. Unfortunately we do not have the complete list of target user file extensions yet, however we do know that the most popular file types are affected by the ransomware virus – audio, video, photos and documents that may contain sensitive and personal information of the victims.

Several security reports indicate that BTC ransomware has an exceptions list – a list of system folders that is not affected by the virus. This is made to prevent problems with the operating system. Such locations include the following:

  • %Windows%
  • %System%
  • %System32%
  • %Program Files%

The compromised files are renamed with the .BTC file extension. The crafted ransom is named idr__btc_decrypt_files.txt and its contents read the following:

For getting back Your PC data You need to contact with us through email as soon as possible:
[email protected]
[email protected]
[email protected]

The full list of target user extensions include the following:

.2015, .3fr, .500, .7z, .accdb, .ai, apk, .arch00, .arw, .asc, .asset, .avi, .bar, .bay, .bc6, .bc7, .big, .bik, .bkf,
.bkp, .blob, .bsa, .cab, .cas, .cdr, .ces, .cfr, .cr2, .crt, .crw, .css, .csv, .d3dbsp, .das, .dazip, .db0, .dba, dbf,
.dcr, .der, .desc, .dmp, .dng, .doc, .docm, .docx, .dwg, .dxg, .ebc, .ebq, .epb, .epk, .eps, .erf, .esm, .ets, .ff,
.flv, .forge, .fos, .fpk, .fsh, .gdb, .gho, .gpc, .hkdb, .hkx, .hplg, .hvpl, .ibank, .icxs, .IIF, .indd, .itdb, .itf, .itl,
.itm, .iwd, .iwi, .jpe .jpeg, .jpg, .js, .kdb, .kdc, .kf, .layout, .lbf, .lgb, .litemod, .lrf, .ltx, .lvl, .m2, .m3u,
.m4a, .map, .mcmeta, .mdb, .mdbackup, .mddata, .mdf, .mef, .menu, .mlx, .mov, .mp4, .mpqge, .mprwref,
.mye, .myoxm .mysql, .ncf, .nd, .nrw, .ntl, odb, .odc, .odm, .odp, .ods, .odt, .ofx, .orf, .p12, .p7b, .p7c, .pak,
.pdd, .pdf, .pef, .pem, .pfx, .pkpass, .png, .ppt, .pptm, ppptx, .psd, .psk, .pst, .ptb, .ptx, .py, .qba, .qbatlg,
.qbb, .qbm, .qbw, .qbx, .qby, .qdf, .qdf, .qfx,. qic, .qif, .r3d, .raf, .rar, .raw, .rb, .re4, .rgss3a, .rim, .rofl,
.rtf, .rw2, .rwl, .sai, .saj, .sav, .sb, .sdb, .sid, .sidd, .sidn, .sie, .sis, .slm, .snx, .sql, .sr2, .srf, .srw, .sum, .svg,
.syncdb, .t11, .t12, .t13, .t14, .15, .tax, .tax2013, .tax2014, .tax2015, .tax2016, .tlg, .tor, .tt14, .tt15,
.tt16, .txf, .txt, .upk, .vcf, .vdf, .vfs0, .vpk, .vpp_pc, .vtf, .w3x, .wallet, .wb2, .wma, .wmo, .wmv, .wotreplay,
.wpd, .wps, .x3f, .xf, .xlk, xls, .xlsb, .xlsm, .xlsx, .xxx, .zip, .ztmp, (230+ extensions)

The following files are related to the BTC Ransomware:

  • %USERPROFILE%\AppData\.exe
  • %WINDIR%\.exe
  • %TEMP%\.tmp
  • %AppData%\wallpaper.wall
  • %WINDIR%\System32\key.public
  • %WINDIR%\System32\key.private
  • BTC Ransomware Distribution

    The BTC ransomware was identified in several live attack campaigns against target computer owners. The main infection strategies included linking infected binary files in the body of the email messages or directly attaching them as files posing to be legitimate documents.

    The operators of the ransomware use various social engineering tricks to trick the victims into infecting themselves with BTC.

    BTC Ransomware Removal

    For a faster solution, you can run a scan with an advanced malware removal tool and delete BTC completely with a few mouse clicks.

    STEP I: Start the PC in Safe Mode with Network
    This will isolate all files and objects created by the ransomware so they will be removed efficiently.

      1) Hit WIN Key + R


      2) A Run window will appear. In it, write “msconfig” and then press Enter
      3) A Configuration box shall appear. In it Choose the tab named “Boot
      4) Mark “Safe Boot” option and then go to “Network” under it to tick it too
      5) Apply -> OK

    Or check our video guide – “How to start PC in Safe Mode with Networking

    STEP II: Show Hidden Files

      1) Open My Computer/This PC
      2) Windows 7

        – Click on “Organize” button
        – Select “Folder and search options
        – Select the “View” tab
        – Go under “Hidden files and folders” and mark “Show hidden files and folders” option

      3) Windows 8/ 10

        – Open “View” tab
        – Mark “Hidden items” option


      4) Click “Apply” and then “OK” button

    STEP III: Enter Windows Task Manager and Stop Malicious Processes

      1) Hit the following key combination: CTRL+SHIFT+ESC
      2) Get over to “Processes
      3) When you find suspicious process right click on it and select “Open File Location
      4) Go back to Task Manager and end the malicious process. Right click on it again and choose “End Process
      5) Next you should go folder where the malicious file is located and delete it

    STEP IV: Remove Completely BTC Ransomware Using SpyHunter Anti-Malware Tool

    Manual removal of BTC requires being familiar with system files and registries. Removal of any important data can lead to permanent system damage. Prevent this troublesome effect – delete BTC ransomware with SpyHunter malware removal tool.

    SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

    STEP V: Repair Windows Registry

      1) Again type simultaneously the Windows Button + R key combination
      2) In the box, write “regedit”(without the inverted commas) and hit Enter
      3) Type the CTRL+F and then write the malicious name in the search type field to locate the malicious executable
      4) In case you have discovered registry keys and values related to the name, you should delete them, but be careful not to delete legitimate keys

    Further help for Windows Registry repair

    STEP VI: Recover Encrypted Files

      1) Use present backups
      2) Restore your personal files using File History

        – Hit WIN Key
        – Type “restore your files” in the search box
        – Select “Restore your files with File History
        – Choose a folder or type the name of the file in the search bar


        – Hit the “Restore” button

      3) Using System Restore Point

        – Hit WIN Key
        – Select “Open System Restore” and follow the steps


    STEP VII: Preventive Security Measures

      1) Enable and properly configure your Firewall.
      2) Install and maintain reliable anti-malware software.
      3) Secure your web browser.
      4) Check regularly for available software updates and apply them.
      5) Disable macros in Office documents.
      6) Use strong passwords.
      7) Don’t open attachments or click on links unless you’re certain they’re safe.
      8) Backup regularly your data.

    SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

    Was this content helpful?

Author : Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *