Severity scale:  
  (29/100) scam. How to identify and remove (2020 guide)

removal by Ugnius Kiguolis - - | Type: Malware

Fastsupport – a legitimate support service used to install malicious software on targeted computer systems

Questions about is entirely legitimate software, developed by LogMeln Inc., which appears as the GoToAssist.exe process on the computer. just like, it is designed to help computer technicians get remote access to the computer system in order to fix its malfunctions and similar problems. Unfortunately, hackers and similar malicious actors have found a way to use this screen-sharing service to implement their malicious needs. They have started using scam while trying to spread their unsolicited requests to access victims' machines and additionally install their malicious software or initiate changes that could lead the system to serious problems.

Type Potentially unwanted program (PUP)/scam/fraud
Process GoToAssist.exe
Symptoms Redirects to bogus websites asking to provide remote access to the computer in order to solve some issues. This way, hackers infiltrate the system with malware or might even try to steal sensitive information
Distribution Misleading websites promoting the scam might appear in first positions on Google. They can also start appearing because of adware which can reach the computer via bundling technique or once the user clicks on the malicious ad
Elimination Experts warn that detecting the components of the PUP might be a tricky task. Thus, get Reimage Reimage Cleaner Intego to uninstall automatically

While trying to reach their target audience, hackers have set up numerous fake websites that have been designed to appear in first positions on Google Search. These sites have been promoting various services to trick people into falling for Fastsupport scam as the most effective way to fix their system. Beware that each of previously-mentioned websites looks incredibly similar to the legitimate ones. Likewise, people who cannot identify the fraud might be tricked to give remote access to their computer and let cybercriminals initiate various tasks behind their back. 

Additionally, GoToAssist.exe/ can appear in a form of the ad claiming that the system is damaged and that you need to allow “certified Microsoft Technicians” to connect to your computer and fix it. Beware that such prepositions should not be allowed because clicking on such ads can infect your machine with serious malware which can easily try to take over your system. The easiest way to notice that the executable file is an imposter is to check the CPU[1] usage in the Task Manager. 

Usually, criminals who tend to use and similar screen sharing software to infiltrate victims' systems with dangerous infections, try to infect them with the following malware: 

  • Banking Trojans;
  • Spyware[2];
  • Ransomware;
  • Potentially unwanted programs (PUPs).

Therefore, if you continuously encounter this scam online, we strongly suggest you close the Fastsupport tab or window that is pushing you into using useless services and search for any suspicious programs on your computer. In most of the cases, adware, hijackers and similar PUPs are responsible for showing corrupted search results and ads. Otherwise, you can end up with serious malware on your computer or can even be tricked into revealing your personal data. is legitimate software. Although, its duplicate might appear online and lure people into a scam.

Keep in mind that the official software and its developers have nothing to do with these scams that have been spreading around for a while. In case your computer is infected, you can remove Fastsupport virus with the help of a professional antivirus like Reimage Reimage Cleaner Intego

Once Fastsupport removal is completed, make sure that you reset each of the affected browsers including Mozilla Firefox, Internet Explorer, Safari, Google Chrome, etc. We have prepared detailed guidelines for those who are not experienced enough and would like some help. You can find them just below.

GoToAssist.exe – a process which can be misused by hackers for exploiting PUPs

GoToAssist.exe is a process which is known to be completely legitimate, however, it can be used to hide potentially unwanted and infectious programs such as This executable allows gaining remote access to a specific server, so the crooks who decide to misuse it can inject malware and various potentially dangerous components by using the remote technique.

If GoToAssist.exe process is misused by very dangerous cybercriminals, these people might use the executable to perform damaging and illegitimate activities on the user's computer system. This service allows bad actors to collect various passwords, login details, steal banking/credit card information, and collect sensitive information about the user himself and the infected machine system.

Nevertheless, malware which is disguised via GoToAssist.exe can be used to inject other types of malicious applications such as trojans or cryptocurrency miners.[3] Furthermore, the executable might be launched to perform suspicious activities in the background such as reading sending email messages. If you consider this process to be malicious, terminate it from the computer system safely by using specific antimalware programs.

FastsupportFastsupport is a potentially unwanted program which can cause suspicious modifications to web browsers such as Chrome, Firefox, Explorer, Edge, and Safari

People are lured into the scam by deceptive techniques[4] experts have analyzed the reports received and warned that the most common way how people encounter the hoax is by clicking it on Google search results. It seems that the fake website which is designed to trick people into giving remote access to the computer looks almost identical to the legitimate one.

Additionally, a significant fraction of the victims unconsciously installed the bogus application together with another free software. This distribution technique is known as bundling and widely used across the world. Thus, people who do not pay attention to the installation process can infect their systems with the virus. 

If you want to avoid all potentially unwanted programs, you must:

  1. Reject Quick/Recommended settings;
  2. Choose Advanced/Custom ones;
  3. Unmark pre-selected boxes which allow installing additional programs;
  4. Check the system with a robust antivirus.

Get rid of Fast scam and block the remote access to your computer

If you have been bothered by scams recently, you should check your system for potentially malicious entries that could be related to this scam. To start removal, you should install a professional malware removal software. Note that it is essential to pick the reliable one if you want to make sure that it will not only eliminate the infection but also prevent its reappearance. For that, check our recommended ones down below. 

Once you remove scam, make sure that you reset the settings on each of the browsers you are using. There is a substantial risk that they have been altered by a potentially unwanted program to display the scam website and trick you into falling for the hoax. Ensure that all changes are reversed and no adware-related content has been left, otherwise, the program can reboot itself easily.

You may remove virus damage with a help of Reimage Reimage Cleaner Intego. SpyHunter 5Combo Cleaner and Malwarebytes are recommended to detect potentially unwanted programs and viruses with all their files and registry entries that are related to them.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove, follow these steps:

Eliminate from Windows systems

If you notice any suspicious behavior on your computer, immediately search for unauthorized programs on Windows and uninstall them.

  1. Click Start Control Panel Programs and Features (if you are Windows XP user, click on Add/Remove Programs). Click 'Start -> Control Panel -> Programs and Features' (if you are 'Windows XP' user, click on 'Add/Remove Programs').
  2. If you are Windows 10 / Windows 8 user, then right-click in the lower left corner of the screen. Once Quick Access Menu shows up, select Control Panel and Uninstall a Program. If you are 'Windows 10 / Windows 8' user, then right-click in the lower left corner of the screen. Once 'Quick Access Menu' shows up, select 'Control Panel' and 'Uninstall a Program'.
  3. Uninstall and related programs
    Here, look for or any other recently installed suspicious programs.
  4. Uninstall them and click OK to save these changes. Right click on each of suspicious entries and select 'Uninstall'

Get rid of from Mac OS X system

Here is the guide showing how to get rid of unknown programs from Mac:

  1. If you are using OS X, click Go button at the top left of the screen and select Applications. Cick 'Go' and select 'Applications'
  2. Wait until you see Applications folder and look for or any other suspicious programs on it. Now right click on every of such entries and select Move to Trash. Click on every malicious entry and select 'Move to Trash'

Uninstall from Internet Explorer (IE)

If you have been experiencing suspicious redirecting or advertising activities on your Internet Explorer web browser, you can reverse such changes with the help of this instructing guide:

  1. Remove dangerous add-ons
    Open Internet Explorer, click on the Gear icon (IE menu) on the top right corner of the browser and choose Manage Add-ons. Click on menu icon and select 'Manage add-ons'
  2. You will see a Manage Add-ons window. Here, look for and other suspicious plugins. Disable these entries by clicking Disable: Right click on each of malicious entries and select 'Disable'
  3. Change your homepage if it was altered by virus:
    Click on the gear icon (menu) on the top right corner of the browser and select Internet Options. Stay in General tab.
  4. Here, remove malicious URL and enter preferable domain name. Click Apply to save changes. Delete malicious URL, enter your desired domain name and click 'Apply' to save changes
  5. Reset Internet Explorer
    Click on the gear icon (menu) again and select Internet options. Go to Advanced tab.
  6. Here, select Reset.
  7. When in the new window, check Delete personal settings and select Reset again to complete removal. Go to 'Advanced' tab and click on 'Reset' button. Now select 'Delete personal settings' and click on 'Reset' button again

Remove from Microsoft Edge

Reset Microsoft Edge settings (Method 1):

  1. Launch Microsoft Edge app and click More (three dots at the top right corner of the screen).
  2. Click Settings to open more options.
  3. Once Settings window shows up, click Choose what to clear button under Clear browsing data option. Go to Settings and select 'Choose what to clear'
  4. Here, select all what you want to remove and click Clear. Select 'Clear' button
  5. Now you should right-click on the Start button (Windows logo). Here, select Task Manager. Open the start menu and select 'Task Manager'
  6. When in Processes tab, search for Microsoft Edge.
  7. Right-click on it and choose Go to details option. If can’t see Go to details option, click More details and repeat previous steps. Right-click 'Microsoft Edge' and select 'Go to details' Select 'More details' if 'Go to details' option fails to show up
  8. When Details tab shows up, find every entry with Microsoft Edge name in it. Right click on each of them and select End Task to end these entries. Find Microsoft Edge entries and select 'End Task'

Resetting Microsoft Edge browser (Method 2):

If Method 1 failed to help you, you need to use an advanced Edge reset method.

  1. Note: you need to backup your data before using this method.
  2. Find this folder on your computer: C:\Users\%username%\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe.
  3. Select every entry which is saved on it and right click with your mouse. Then Delete option. Go to Microsoft Edge folder on your computer, right-click every entry and click 'Delete'
  4. Click the Start button (Windows logo) and type in window power in Search my stuff line.
  5. Right-click the Windows PowerShell entry and choose Run as administrator. Find Windows PowerShell, right-click it and select 'Run as administrator'
  6. Once Administrator: Windows PowerShell window shows up, paste this command line after PS C:\WINDOWS\system32> and press Enter:
    Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register $($_.InstallLocation)\AppXManifest.xml -Verbose}
    Copy and paste a required command and press 'Enter'

Once these steps are finished, should be removed from your Microsoft Edge browser.

Delete from Mozilla Firefox (FF)

  1. Remove dangerous extensions
    Open Mozilla Firefox, click on the menu icon (top right corner) and select Add-ons Extensions. Click on menu icon and select 'Add-ons'
  2. Here, select and other questionable plugins. Click Remove to delete these entries. Select 'Extensions' and look for malicious entries. Click 'Remove' to get rid of each of them
  3. Reset Mozilla Firefox
    Click on the Firefox menu on the top left and click on the question mark. Here, choose Troubleshooting Information. Click on menu icon and then on '?'. Select 'Troubleshooting Information'
  4. Now you will see Reset Firefox to its default state message with Reset Firefox button. Click this button for several times and complete removal. Click on 'Reset Firefox' button for a couple of times

Erase from Google Chrome

In case you are continuously redirected to and asked to submit personal details, be aware that your Chrome browser is hijacked. Thus, delete all suspicious entries and reset the browser as shown below.

  1. Delete malicious plugins
    Open Google Chrome, click on the menu icon (top right corner) and select Tools Extensions. Click on menu icon. Select 'Tools' and 'Extensions'
  2. Here, select and other malicious plugins and select trash icon to delete these entries. Look for malicious entries and delete each of them by clicking on the Trash bin icon
  3. Click on menu icon again and choose Settings Manage Search engines under the Search section. When in 'Settings', select 'Manage search engines...'
  4. When in Search Engines..., remove malicious search sites. You should leave only Google or your preferred domain name. Click 'X' to remove malicious URLs
  5. Reset Google Chrome
    Click on menu icon on the top right of your Google Chrome and select Settings.
  6. Scroll down to the end of the page and click on Reset browser settings. When in 'Settings', scroll down to 'Reset browser settings' button and click on it
  7. Click Reset to confirm this action and complete removal. Click on 'Reset' button to complete your removal

Eliminate from Safari

  1. Remove dangerous extensions
    Open Safari web browser and click on Safari in menu at the top left of the screen. Once you do this, select Preferences. Click on 'Safari' and select 'Preferences'
  2. Here, select Extensions and look for or other suspicious entries. Click on the Uninstall button to get rid each of them. Go to 'Extensions' and uninstall malicious add-ons
  3. Reset Safari
    Open Safari browser and click on Safari in menu section at the top left of the screen. Here, select Reset Safari.... Click on 'Safari' and select 'Reset Safari...'
  4. Now you will see a detailed dialog window filled with reset options. All of those options are usually checked, but you can specify which of them you want to reset. Click the Reset button to complete removal process. Select all options and click on 'Reset' button

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant a full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. 

Nevertheless, there's a way to add an extra layer of protection and create a completely anonymous web browsing practice with the help of Private Internet Access VPN. This software reroutes traffic through different servers, thus leaving your IP address and geolocation in disguise. Besides, it is based on a strict no-log policy, meaning that no data will be recorded, leaked, and available for both first and third parties. The combination of a secure web browser and Private Internet Access VPN will let you browse the Internet without a feeling of being spied or targeted by criminals. 

Recover files after data-affecting malware attacks

While much of the data can be accidentally deleted due to various circumstances, malware is also one of the main culprits that can cause loss of pictures, documents, videos, and other important files. Potentially unwanted programs may clear files that keep the application from running smoothly.

More serious malware infections lead to significant data loss when your documents, system files, or images get locked. In particular, ransomware is is a type of malware that focuses on such functions, so your files become useless without an ability to access them. Even though there is little to no possibility to recover after file-locking threats, some applications have features for data recovery in the system.

In some cases, Data Recovery Pro can also help to recover at least some portion of your data after data-locking virus infection or general cyber infection. 


About the author

Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions


Removal guides in other languages

Your opinion regarding