Search this blog

User's Handbook (FAQ)


GridinSoft Trojan Killer aids in removal of Malwares - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. The majority of Anti-Malware Scanners are well able to detect malicious software - Trojan Horses, Internet Worms, Adware/Spyware etc. - but are not always efficient in removing them once they have been triggered. GridinSoft Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. GridinSoft Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware.

How to start a scan?

Several scan types are available. The Quick Scan quickly scans the system with no need for further configuration of the scan parameters. It checks the most critical parts of your system. The Full Scan checks all of your computer and hard disks for availability of threats. The Custom Scan allows the user to select any of the particular folders for scan. Explore button lets you additionally scan ActiveX components, services, extensions and startups for presence of other available infections. To simply start a scan of the computer, click on the Scan tab and click Quick scan button. GridinSoft Trojan Killer will show that the scan is taking place.

You can terminate the scan at any time by clicking on the Pause button and then selecting Stop Scan button. After answering "yes" at the confirmation message the scan shall be cancelled. When the scan has been completed, GridinSoft Trojan Killer will display the list of threats (in the case of detection) that have been checked for removal.

How to update GridinSoft Trojan Killer?

Regular update of the system is the basic premise for obtaining the maximum level of security provided by GridinSoft Trojan Killer. The Update module ensures that the program is always up to date. This is done in two ways – by updating the virus signature database and by updating the application itself. The information about the current update status can be found by clicking the Update tab, including the current version of the virus signature databases. The information window also contains other details, such as the date and time of the last successful update.

How to reset Internet Explorer settings?

There are some malware programs which amend your browser settings causing redirect problems and other related issues. Additionally, the main browser Home, Start and Search Page preferences may be amended - again, in order to redirect user to other unwanted web addresses. In order to reset these settings back to the normal mode please click "Tools" menu and then select "Reset IE Settings" option.

How to reset HOSTs file?

Each computer has a special HOSTs file aimed to store the web addresses. In certain cases this file can be used to speed up the access to the web pages you tend to visit more often. However, sometimes this file is being abused by malwares. If this is the case, you might need to try the option of resetting the HOSTs file, by clicking "Tools" menu and selecting "Reset HOSTS".

The Windows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name (e.g. with its DNS address, the web browser can find the website more quickly as it does not have to query a DNS Name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related or antivirus company websites), or to re-direct access to websites of their preference.

How to reset update policies?

Some Malware programs attempt to prevent Windows Update from running, and inhibit access to resetting Windows Update by blanking out the Windows Update options on the Update configuration screen. This Utility will check the current Windows Update settings and correct them where necessary. In order to use it please go to "Tools" menu and select "Reset update policies" option.

How to collect system info?

This options gives us a chance to analyze the actual virus vulnerability status of your computer, to check the persistency of any particular malware program on your computer and to make certain modifications to our anti-virus database in order to help you get rid of particular viruses (even the latest ones). We might ask you to generate this special file about the security status of your system for our analysis. In order to generate it please go to "Tools" menu and select "Collect System Info". When the report is generated please save it to certain folder of your computer and send it to us for our analysis via customer ticket support system (by creating a new ticket).

How to view quarantine list?

Quarantine list is the list of all threats and infections detected during the scan. It is opened at the end of each scan, being followed by the recommendation to remove all detected threats. However, user may restore certain file if he/she considers it to be a false positive (at his/her own risk). Please report the false positive to us via customer ticket support system (by creating new ticket). In order to view / open the quarantine list please go to "Tools" menu and select "Quarantine list" option.

How to retrieve a scan log file?

Scan log file is like the image of the scan process of your computer with GridinSoft Trojan Killer. In some cases we may ask you to send us one or several scan log files for our analysis. This is especially required when analyzing the refund requests, so please make sure to send us such information via ticket support system (by creating a new ticket). In order to generate the scan log file please go to "Tools" menu and select "Log files" option. When the scan log file is generated please save it to some folder of your computer and send it to us for our analysis in the order described above.

GridinSoft Trojan Killer Settings

In order to choose the program settings of your preference please click "Tools" menu and select "Settings". The special window will appear where you will be able to choose your own settings to make the use of GridinSoft Trojan Killer personalized by you.

How to activate full version of GridinSoft Trojan Killer?

Simply click on the Help tab and click Activate now. For ordering GridinSoft Trojan Killer folow this link When your registration has been authorised you will receive an email containing your Username, e-mail address and Licence Key / Activation Code. You will need to enter this information into the program in order to remove the expiry limitations. Please be advised that it is mandatory to correctly indicate both activation code and the e-mail address to which you registered the program. Please indicate this information in the fields shown at the screenshot below.

How to contact GridinSoft Trojan Killer Team?

The best way to contact GridinSoft Trojan Killer for any issues is via customer ticket support system available through this link: and by writing a ticket to us. It is the fastest way to receive the answer to your question.
Trojan Killer official website:
Sending A File For Analysis
If you are unsure that a file detected by Trojan Killer is actually Malware you may wish to send a copy to GridinSoft for further analysis. The file should be placed in a zip file password-protected with the password GridinSoft. Then send the file as an email attachment to with the subject 'File For Analysis'. When sending the email, please be sure to include:
1 - an email address where you can be contacted
2 - details of why you believe the file to be infected
Note: if you are going to send the sample via Yahoo or Google Mail, then you should change the file extension of any executable file (e.g. .exe, .com, .scr) to something else (e.g. .ex0, .co0, .sc0) before placing it in the zipfile, otherwise these email providers will prevent the email from being sent.

Search this blog