How to remove Win32/Detplock

Win32/Detplock is a Trojan virus that easily infested your PC with your assistance, and was installed with your own hands. Win32/Detplock is not useful and has no useful functions, so it has to be uninstalled as fast as possible. Now we'll tell you how Trojans infect your computer and how to distinguish good program from Trojan. Here is the brief description of Trojans, of their abilities, strengths and weaknesses. The name "Trojan" speaks for itself: malware of this kind secretly infects users' computers, pretending to be useful programs, but they cannot distribute themselves. Viruses aren't the same thing as Trojans, because viruses are almost fully independent, and Trojans have to be maintained and directed. Trojans rely on people fully, at all stages of their "life". The creators of the Trojan have to give it the guise of a helpful utility, and upload the Trojan to a highly attended web-resource from which the maximum number of visitors can download it. The place of Trojan's next host is vacant, and if you like these tiny creatures - just install as much free tools as you can, and soon you'll get one. One more significant thing about Trojans is that they commonly are being distributed with help of bundling, which means that they get into the computer in one package with 4-5 other viruses.


Even having some restrictions in the methods of spreading, Trojans are very efficient after they get through system's defense. Trojan viruses are the very multiple sort of dangerous programs, and may use your PC in a criminal scam, call a lot of issues with the device or steal the passwords. Here's a complete list of possible ways to use Trojans:


  • Trojan programs, due to their invisibility, are nearly perfect utilities for spying on common people. Trojan can live in contaminated system for years, collecting data about its operator, passwords, accounts, visited websites and in general any text entered via keyboard.
  • The less efficient way of using Trojans is to develop so-called botnets. By "botnet" we consider many computers, Macs or even "smart" vacuum cleaners united by swindlers in one net that they use for various purposes. With the assistance of these webs they attack government websites, send lots of spam and use their calculating powers for other purposes, like mining of crypto-currency.


All these methods of Trojan usage might be carried out apart of other ones or at the same time. In addition to the written above main goals, which directly benefit web-criminals, Trojans have multiple side effects: they operate your computer's recourses, choke up its hard drive with trashy programs and prevent the machine from running for its primary function. Understanding this, you'll listen to our advice and remove Win32/Detplock once and for all.


Removal instruction

Step 1. Boot the system into safe mode

  • Press Start
  • Type Msconfig and press Enter

Safe mode. Step 1


  • Select Boot tab

Safe mode. Step 2



  • Select Safe boot and press Ok

More information about Safe mode: What is Safe Mode and how to boot computer in Safe Mode


Step 2. Show all hidden files and folders

  • Press Start
  • Click on Control Panel

Show hidden files. Step 1


  • Select Appearance and Personalization

Show hidden files. Step 2


  • Click on Folder Options
  • Select View tab
  • Select Show hidden files, folders and drives

Show hidden files. Step 3


  • Press Ok


Step 3. Remove virus files


Check next folders to find suspicious files:

  • %TEMP%
  • %ProgramData%


Step 4. Fix hosts file

  • Go to %SystemRoot%\System32\drivers\etc\ folder



  • Open hosts file using Notepad or other text editor
  • Delete suspicious elements
  • Basic hosts file looks like this:



Step 5. Clean registry (for experienced users)

  • Click Start
  • Type Regedit.exe and press Enter
  • Clean startup registry keys
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKEY_LOCAL_MACHINE(HKEY_CURRENT_USER)\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit

Step 6. Scan computer with antivirus


We present you a simple and effective way to uninstall Trojans using Spyhunter antiviral tool. This software will not only clear the workstation of all installed malware on it, but at once protect it from other suchlike problems. Spyhunter works automatically, and for removal you'll simply have to purchase antivirus, install it and launch it. We prefer this method, since it is hard for an ordinary user to recognize the dangerous files. By deleting the important file, you might seriously disrupt the device, and call its fatal error. If you doubt the efficiency of Spyhunter, you can check the program in action by getting a test version.


Special Offer

Download Spyhunter - Anti-malware scanner

We advise downloading SpyHunter to see, if it can detect malware for you.

Spyhunter has a biggest malware database

It protects the system against all kinds of threats: Trojans, adware and hijackers

24/7 Free Support Team

SpyHunter scanner detects threats and malware for free, but to remove infected elements you need to purchase a full version of program for 39.99$. More information about Spyhunter, EULA and Privacy policy.


Step 7. Disable Safe Mode and restart computer

  • Press Start
  • Type Msconfig and press Enter
  • Select Boot tab
  • Remove the check near Safe boot


Video with trojan virus





Share your feedback to help other people
1 1 1 1 1 1 1 1 1 1 Rating 5.00 [1 Vote]

Add comment

Security code



Acronis suggestion to CrashPlans users

Around a month ago, there was an accident with CrashPlans backup software.

What is MicTrayDebugger and is it dangerous

This is a brief entry about MicTrayDebugger: what is it, how it appeared in the system, is it dangerous and how to get rid of it.

What is HoeflerText and is it dangerous?


This article is dedicated to the fraud scheme that is called HoeflerText font wasn't found. We will explain you what is this scheme and how to avoid it.

What is Wpad.dat virus and how it is used

The topic of our today's article is a script that had been unjustly called a virus. It’s Wpad.dat, and it is not a virus. We will explain what is Wpad.dat and how to prevent fraudsters to deceive yourself with its help.


Cancer virus trollware

This is an article about crazy Cancer virus and the madness that it brings to victim's computer.

This website uses cookies to improve your experience