Remove Trojan.FakeAV (March 2019 Update)

Parasite may reinstall itself multiple times if you don't delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your time to about 15 minutes. 

Download SpyHunter Anti-Malware

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

This page aims to help you remove Trojan.FakeAV. These Trojan.FakeAV removal instructions work for every version of Windows.

One particularly nasty type of malware that many users encounter is the so-called Trojan horse. Programs of this type are normally used for a wide variety of illegal tasks and what the virus does once it infects the targeted PC really depends on the hacker’s intent. We will elaborate upon this further in this article but for now what you need to know is that if a Trojan horse has attacked your machine, there are all sorts of problems that it might cause. The topic of today’s article will be one particular Trojan horse virus known as Trojan.FakeAV. Though its recent release, it has already spread like a wildfire and many users have already fallen prey to it. Our goal here is to acquaint our readers with the potential capabilities of Trojan.FakeAV, teach them how to recognize the virus infection and also explain how to prevent the Trojan from getting inside the computer. Since many of you have ended up here in search for help with the removal of the Trojan, we have that covered as well. If removing Trojan.FakeAV is what you need help with, go to our guide at the bottom of the current article and follow the steps in order to eliminate the malware. However, note that it is advisable to first read the article itself since the information in it is crucial to effectively dealing with this type of viruses.

Trojan Horse uses

Since the list of potential ways in which a Trojan horse can be used is quite extensive, here we will only mention the most common examples of what this type of malware can potentially do.

  • PC destruction – The first and most obvious of examples is when a Trojan is used to damage the system of the computer. There are a number of different methods through which this can be achieved. Important OS files might get corrupted/deleted, the computer might be caused to crash, the whole Hard-drive could be formatted and so on and so forth.
  • Spying/stalking – Another very harmful trait of many Trojans is their ability to spy on their victims. Invasion of one’s personal space is a huge issue and viruses like Trojan.FakeAV are oftentimes used to do exactly that. The malware can use the keystroke logging method in order to record everything the user types on their keyboard or directly monitor what’s happening on the PC’s screen. However, the most unnerving surveillance method used by Trojans is when they grant the hacker with access to the computer’s webcam and use that to stalk their victim.
  • Backdoor/ Ransomware attacks – A big part of the instances of Ransomware attacks are contributed to Trojan horses, since the latter can also be used for allowing other viruses to invade the already infected PC.
  • Use of PC resources – Another thing that some Trojans are capable of is to take over the infected machine and force it to execute different tasks. Most commonly, the computer would be used as a spam-bot or turned into a mining tool for bitcoins that would get sent to the cyber-criminal who is using the virus.

Detecting Trojans

One of the main reasons for the very high success rate of Trojan horse attacks is the fact that they are oftentimes incredibly difficult to detect in time. Though sometimes a virus like Trojan.FakeAV could trigger certain symptoms, oftentimes this is not the case and there’s hardly anything that would give away the undergoing Trojan horse invasion. That is why it is of utmost importance that one has a good and fully-updated anti-malware program on their PC since in many cases this is the most effective way to intercept a Trojan horse attack.

That being said, knowing what potential symptoms a Trojan horse infection might have is still be helpful depending on the situation. Some of the more common signs of a Trojan attack are frequent system crashes to BSOD (Blue Screen of Death), decreased PC productivity due to unusually high CPU and RAM usage, general system instability and error warnings, changes to files and folders that have been done without your permission, etc. If you notice any of those symptoms, you should probably issue a system scan and use our guide just in case.

Making your computer safer

Trojans are everywhere and there’s always the chance of getting your machine attacked by one in future. However, if you remember the following few tips and make use of them, your computer will be much better protected and the chances of you landing Trojan.FakeAV or some other Trojan will be greatly decreased:

  • Probably the most important piece of advice that we can give you regarding your computer’s safety is to be very careful and thoughtful when browsing the World Wide Web. Keep away from sites that have shady contents or look suspicious and only download software from reputable and trusted sources.
  • Next, you must be able to recognize online spam as soon as you see it. It is generally easy to tell whether a new e-mail or Facebook/Skype message is spam. Just remember to not click on any single link or open any single file attachment that gets send to you before you can be absolutely certain that it is not potentially unwanted and harmful.
  • We already mentioned that but we will say it again – get your computer a high-quality security program because this is a key factor when it comes to fighting not only Trojans but any sort of malware.
  • Be careful not to fall for any deceitful online offers. Again, it is quite easy to discern the shady and potentially fake ones, it’s just a matter of common sense. For example, if a browser notification tells you that you have won an iPhone or some large sum of money from a lottery you did not even participate in, it is more than likely a blatant ruse.



Name Trojan.FakeAV
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  A Trojan horse attack might cause your PC to consume unusually high amounts of CPU and RAM, start to experience frequent BSOD crashes and also have a lot of errors.
Distribution Method  Malicious junk mail, illegal websites with harmful banners/ads, shady torrent files and unreliable download sources are the most common distribution methods for Trojans.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.

Remove Trojan.FakeAV



Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. We recommend downloading SpyHunter to see if it can detect parasite files for you.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

If you want to avoid the risk, we recommend downloading SpyHunter
a professional malware removal tool.

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide didn’t help you, download the anti-virus program we recommended or ask us in the comments for guidance!

Leave a Comment