How to remove Inquiry.doc trojan virus


Our article will tell you about the Trojan virus called Inquiry.doc, the ways of infection, and the ways to shield your system from it. We've made easy and efficient advices that will assist you to uninstall Inquiry.doc, and any aftermath of its doing once and for all.

The object of the following piece is Inquiry.doc Trojan, on which we’ve been getting a lot of complaints recent days. If the workstation is infected with this program, then you most likely face some problems with its elimination. Trojans are known for their high effectiveness, and are capable of actively resisting removal, make their backups and recover after partial removal. We can help you, and in final part of this guide you will see the efficient advices on Inquiry.doc elimination. Trojan viruses don't infect the computer on their own, so you shouldn't aim at the deletion of one virus, but scan the system as a whole. If you know enough about Trojans - skip the information parts, but if Trojans threat is something new for you - familiarize with the following paragraphs to learn how to guard your PC against such threats.


What is Inquiry.doc trojan

Statistics show that Trojan viruses make up the largest percentage of all undesired programs, thanks to usability and effectiveness. The very common examples of such goals are the steal of passwords and crucial data, spying on the user, botnets building or downloading and controlling already installed malware. The only disadvantage of Trojans is being explained by their name - they cannot infect anything without victim's consent. In last years, users began to think that any malicious or unwanted software are viruses, but strictly speaking, viruses, instead of Trojans, can easily spread and infect the defenseless systems. Trojan viruses efficiently get into PC's with help of other programs or with customer's assistance, but can't perform it on their own. After infesting the PC, Trojan virus is extremely hard to find manually that is very valuable for all sorts of hackers. All things that are written in this paragraph lead us to an easy solution: Trojan viruses have to be found and avoided before they get into the PC!

There is a widespread (and bad) thought that AV tool is capable of defending the PC from viruses. Antiviral utilities are extremely useful, but they cannot restrict the whole Internet, and prohibit you to download anything you want, including malware. But, if you will help your antivirus to work, instead of preventing him from doing its job, the computer will be protected. There are two methods to achieve this effect:

  • If you aren't going to fully abandon the use of unlicensed content, you have to carefully examine all programs that you are installing. Trojans commonly lurk under the guise of helpful programs such as AV programs, browsers, system optimizers, driver updaters, browser games and search engines. Do not install weird utilities from the above list, and when another pirated utility is installing - watch closely at the installation, revoking all offers for downloading additional programs.
  • The easiest option is to completely quit using tools of suspicious background. These principles concern all the tools downloaded not from website of its developer or trusted distributors. Of course, any cracked copies of good utilities also are potentially dangerous. If you stop using such programs, the chances of infection would be reduced to minimal, and antivirus can quickly cope with it.

Follow these directions and you will immediately feel the result: the computer will become workable, clean and quick, and will remain so for a long time.

Inquiry.doc removal instruction

If you are MAC user, follow this guide How to remove virus from MAC

Commonly we offer two manners to delete malicious programs, but in this case, when deleting Trojans, there is almost no possibility to reveal and get rid of them manually. Trojan can be placed literally anywhere in the system, so an inexperienced user can slip up, erase a crucial folder and damage the OS. To avoid this, we've created an instruction that will help you to delete Inquiry.doc quickly and effectively. Step #1 will be booting the PC in Safe Mode and inspecting system data. Stage #2 is to download and install Spyhunter AV. After that - abide the instructions, and in a few moments the computer will be back in service.

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

Don't forget that there's no need to immediately buy Spyhunter - you can verify its effectiveness by downloading a free trial version. If you're interested in downloading Spyhunter or need more information - press the link below.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

bwd  Instructions 1/2  fwd

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

Video guide

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.