Remove Caphaw Malware


This page aims to help you remove the Caphaw Malware. Our removal instructions work for every version of Windows.

How dangerous is the Caphaw Malware?

Remove Caphaw Malware

The Caphaw Malware will display a Pop-up window claiming you have been infected, it will demand you buy their services to remove the threat.

The presence of a Trojan Horse malware program inside your computer could be the cause for many potential issues related to your computer’s health and your virtual privacy. Caphaw is a malicious program of this type and if you are here because of this particular threat, make sure to read everything that this article, and the removal guide after it has to offer.

If the Caphaw Malware is inside your machine and you know it, this is actually good news because now you can do something about it. Many users do not get the chance to counteract the Trojan on time simply because they remain unaware of its presence in the system for a very long time. This is largely due to the stealthy nature of most Trojans – they are malware infections that oftentimes try hard to stay unnoticed. Of course, the presence or lack of symptoms heavily depends on what the infection is used for, which brings us to our net point.

Most other forms of malware have specific uses and are limited to those uses. Take the Ransomware cryptoviruses for example – those are highly problematic malware threats, but they pretty much always do the same thing, which is encrypt your files and demand a ransom payment from you. Aside from that, there isn’t much else that a cryptovirus could do. A Trojan, however, may have a number of abilities and which one of them gets used depends on what the hackers behind it are trying to achieve. For instance, a Trojan may be utilized as an espionage tool – it may take screencaps of your screen and/or it may keylog everything you type while using your keyboard. This could allow the criminals behind this threat to get their hands on all kinds of sensitive information, which they could later use in all sorts of nasty ways. This, however, is not all – a Trojan like Caphaw, Cloudnet or Idle Buddy may also be used as a silent distributor for other malware – Ransomware is oftentimes distributed through the help of a dropper Trojan that creates backdoors in the infected system. One other thing Trojans are oftentimes used for is to create a whole botnet of machines infected by them, which the hackers could then remotely control and use for various big-scale activities. Some of those activities include mining of BitCoins, distribution of spam messages, and conducting Denial of Service attacks on popular sites, or on the sites of important institutions. As we said, the symptoms may depend on the use of the Trojan – if the infection is used for its espionage abilities, you are unlikely to notice anything suspicious, but if the Trojan is using all of your computer’s RAM, GPU and CPU power to mine cryptocurrency, there would almost certainly be a slow-down of the system. Now, we can’t tell you exactly what Caphaw may be used for, and it’s best if you don’t wait to find out. Remove the Caphaw Malware as soon as you can using our removal guide and make your computer clean once again.


Name Caphaw Malware
Type Trojan
Danger Level High (Trojans are often used as a backdoor for Ransomware)
Symptoms Trojans infections may cause slow-downs in the computer, may trigger errors and may lead to BSOD crashes.
Distribution Method Most distribution methods involve the use of some sketchy site with malicious ads or that of some spam message campaign.
Detection Tool

Remove Caphaw 

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide

Remove Caphaw Malware

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Remove Caphaw Malware


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Remove Caphaw Malware

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Remove Caphaw Malware
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result
Remove Caphaw MalwareClamAV
Remove Caphaw MalwareAVG AV
Remove Caphaw MalwareMaldet

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Remove Caphaw Malware

Hold together the Start Key and R. Type appwiz.cpl –> OK.

Remove Caphaw Malware

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

Remove Caphaw Malware

Remove Caphaw Malware

Type msconfig in the search field and hit enter. A window will pop-up:

Remove Caphaw Malware

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

Remove Caphaw Malware

If there are suspicious IPs below “Localhost” – write to us in the comments.

Remove Caphaw Malware

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


About the author


Brandon Skies

Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

Leave a Comment