Remove Js Faceliker ag Malware (detected by McAfee)

Remove Js Faceliker ag Malware (detected by McAfee)Remove Js Faceliker ag Malware (detected by McAfee)Remove Js Faceliker ag Malware (detected by McAfee)


This page aims to help you remove Faceliker Malware. Our removal instructions work for every version of Windows.

Every computer user needs to have at least a basic idea of how to keep their machine protected and secured against different forms of undesirable software programs and malware viruses. Now, there are all kinds of malicious virus programs out there that can cause all different kinds of harm and lead to a number of issues if you have the misfortune of landing them on your computer. Such malware programs could be Spyware, Ransomware, Worms, Rootkits and so on. However, today, we will be focusing on arguably the most commonly encountered and also one of the most dangerous categories of malware you could possibly encounter. You have surely already heard about the infamous Trojan Horses – noxious software programs designed to silently and stealthily infiltrate the user’s computer and then carry out different criminal tasks to the benefit of the hackers behind the infection. Since this is one of the most popular categories of malware out there, it is only natural that new versions of this virus class would pop-up every now and then to terrorize the users who haven’t taken the necessary precautions to keep their machines properly protected against such threats. One of the latest examples of a Trojan Horse virus that is currently on the rise is the nasty Faceliker infection. In fact, the appearance of this new threat is the main reason why I am currently writing this post. Here, on our site, we strive to help our readers deal with the latest software threats and problems and since this is currently one of the most problematic and widespread forms of malware out there, it is essential that we ensure to provide the visitors of our site with useful and relevant information with regards to this malicious malware piece.

Remove Js Faceliker ag Malware

Remove Js Faceliker ag Malware (detected by McAfee)

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Remove Js Faceliker ag Malware (detected by McAfee)


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Remove Js Faceliker ag Malware (detected by McAfee)

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Remove Js Faceliker ag Malware (detected by McAfee)
Drag and Drop File Here To Scan
Remove Js Faceliker ag Malware (detected by McAfee)
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    After you open their folder, end the processes that are infected, then delete their folders. 

    Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

    Remove Js Faceliker ag Malware (detected by McAfee)

    Hold together the Start Key and R. Type appwiz.cpl –> OK.

    Remove Js Faceliker ag Malware (detected by McAfee)

    You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

    Remove Js Faceliker ag Malware (detected by McAfee)

    Remove Js Faceliker ag Malware (detected by McAfee)

    Type msconfig in the search field and hit enter. A window will pop-up:

    Remove Js Faceliker ag Malware (detected by McAfee)

    Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

    • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

    Hold the Start Key and R –  copy + paste the following and click OK:

    notepad %windir%/system32/Drivers/etc/hosts

    A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

    Remove Js Faceliker ag Malware (detected by McAfee)

    If there are suspicious IPs below “Localhost” – write to us in the comments.

    Remove Js Faceliker ag Malware (detected by McAfee)

    Type Regedit in the windows search field and press Enter.

    Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

    • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
      HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
      HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

    Below, you will learn about the most important traits of this virus and you will also be provided with a guide for removing it. Note that in the guide below, you can find two separate methods of eliminating the malware. The first method are the manual steps that can help you detect and eliminate the infection on your own. The second one is through using the suggested removal program that’s available in the guide. Of course, you can combine the two methods for even greater chance of success which is why we’d advise you to do exactly that.

    Concerning Trojan Horses and Faceliker

    Virus programs like Faceliker can be a rather big issue if they find their into your PC as they can really mess up your system and cause other issues that you certainly don’t want to face. The problem is that it’s oftentimes difficult to prevent a Trojan Horse infection, especially if you aren’t used to staying careful while online. You see, most Trojans use different types of misleading content to trick the users into unknowingly loading/downloading the malware onto their PCs. Content that can be used for Trojan Horse distribution typically includes spam e-mail messages and spam social network messages, pirated programs that can be downloaded by the users, misleading web advertisements, fake update requests, deceitful online offers and so on. All in all, there quite a big number of ways you could land a Trojan on your PC if you are not careful. However, there’s a silver lining to all this and that silver lining is the fact that when it comes to most Trojan Horse infections, a big part of your computer’s security is in your hands. By that we mean that if you are cautious enough and are mindful of the stuff you interact with online, you should be able to keep your machine relatively safe from such viruses since in most of the cases, even a malware piece as nasty as Faceliker is unlikely to be able to automatically infiltrate your PC without you having done anything beforehand that would allow the malware to infect your computer.

    What can a Trojan do?

    Trojan viruses like Faceliker are known for their versatility. In one instance, the malware program might be sued to spy on you and collect sensitive data which it could later be used for blackmailing purposes while in another, the infection might damage your system and corrupt the data on your HDD. Also, such virus programs can be used to download more malware inside your system – Ransomware, Rootkits, Worms and so on. A number of Trojans are also known to establish whole botnets of infected computers where the targeted machines can be remotely controlled by the hackers who have attacked them with the Trojan and use them for tasks such as cryptocurrency-mining, Denial of Service attacks, spam distribution and so on. With all that said, it should be obvious just how important it is to protect your PC against Faceliker and against Trojan malware in general. One last tip we must give you here is to never underestimate the importance of having a reliable antivirus program as this could oftentimes be the only way to detect a Trojan since most such infections lack any specific symptoms.


    Name Faceliker
    Type Trojan
    Danger Level  High (Trojans are often used as a backdoor for Ransomware)
    Symptoms  A Trojan might sometimes cause different system disturbances but there’s no guarantee that there would be any symptoms in your case.
    Distribution Method Malicious spam messages, sketchy web ads, suspicious online offers, pirated software and so on.
    Detection Tool

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


    About the author


    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    Leave a Comment