This page aims to help you remove Inquiry.doc Virus. Our removal instructions work for every version of Windows.
The security experts have recently detected a new online threat, which is targeting computers all over the world. This new threat is called Inquiry.doc Virus, and as per the latest analysis, it belongs to the Trojan horse category. Specialists advise that every computer user should do their best to avoid contamination by this new malware, because once inside the system, it can cause some unpredictable issues. Starting from system malfunction, modification or deletion of important files and software, data theft, and espionage to irreparable system corruption, the criminals behind Inquiry.doc can utilize this malware program in a variety of ways and use it for all types of illegal and harmful activity. They may use the infection to keep a track of your online and offline activities, steal your passwords and login credentials or some sensitive financial or professional data which could then help them perform various types of fraud and harassment. Another very common possible exploitation of the Trojan is for distribution of other viruses such as Ransomware, Spyware, Keyloggers, etc. With its help, basically any malware could enter the system without being detected and may launch its criminal activities in complete stealth. Unfortunately, protecting your PC may not be easy, because Inquiry.doc may camouflage as almost anything and may hide in various malware transmitters. However, if you have even the slightest doubt that this threat has somehow sneaked inside your system, we highly recommend you run a throughout system scan with the professional security tool suggested on this page and also follow the instructions from the Removal Guide below.
Are there signs, which can give away the presence of Inquiry.doc on your system?
These threats are very sophisticated and they often use different kinds of disguise as well as various forms of social engineering to get inside the users’ system. Normally, the malware may appear in the form of a harmless-looking piece of content (it could be a link, an ad, an image, an email attachment, a software installer, etc.) and trick the users into clicking on it. Once they interact with the transmitter, the Trojan secretly infects the system, usually without visible symptoms. And what is worse, it can remain there for weeks or even months before the victims realize what has happened.
Inquiry.doc Virus Removal
Some of the steps will likely require you to exit the page. Bookmark it for later reference.
Reboot in Safe Mode (use this guide if you don’t know how to do it).
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous.
Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:
This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/
After you open their folder, end the processes that are infected, then delete their folders.
Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.
Hold together the Start Key and R. Type appwiz.cpl –> OK.
You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:
Type msconfig in the search field and hit enter. A window will pop-up:
Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.
- Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.
If you want to avoid the risk, we recommend downloading SpyHunter - a professional malware removal tool - to see whether it will find malicious programs on your PC.
Type Regedit in the windows search field and press Enter.
Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:
- HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random
If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!
In some rare cases, the users may notice unusual system behavior or software issues, unusually high CPU or RAM usage, sudden system crashes, pop-up error messages or a general decrease in the computer’s productivity. However, these signs could also be related to some other issues as well. The best we could advise you if you notice some unusual behavior on your PC is to run a full scan with your antivirus software. Bear in mind though, that some antivirus programs may not be able to detect and remove advanced Trojan infections such as Inquiry.doc which is why you must also be vigilant and on the lookout for anything suspicious. To remove the virus, you use either use the manual instructions from the guide below or the recommended anti-malware program (or you can combine the two methods).
How to protect your PC from Trojans?
As we already said above, the criminals who create Trojan horse infections could get very creative with regards to the methods of distribution for their viruses. Sadly, there is no a 100% surefire method that could promise you complete protection against these nasty threats. However, to remain safe as much as possible, we recommend you follow some basic online security rules. Do not trust every pop-up, ad, link or tab that appears on your screen and be selective about the online locations that you go to. Only interact with trusted web pages and try not to click on any spam or too-good-to-be-true offers. Your email inbox should also be monitored closely and we highly recommend you do not open the attachments from e-mails which have been sent by unfamiliar senders. The presence of reliable antivirus software is of utmost importance when it comes to the timely detection of potentially malicious software. That’s why we encourage you to invest in a reputed security software tool and run regular scans with it. Don’t forget to update its virus definitions on a regular basis so that it can provide you with reliable protection against the newest computer threats such as Inquiry.doc. Another preventive measure in case such malware has been detected on your system is to change your login credentials and passwords. Even if you have successfully removed the Trojan with the help of the instructions below, you never know what it might have managed to steal or complete while on your system.
|Danger Level||High (Trojans are often used as a backdoor for Ransomware)|
|Symptoms||Increased use of RAM and, CPU time, frequent errors, blinking boxes, sudden crashes, freezes, etc.|
|Distribution Method||Spam messages, fake ads, misleading links, infected email attachments, compromised software installers, pirated content and illegal websites.|