How to remove Igloo

84 threats found

Adware Igloo

84 threats removed

Recommended solution

Download OSHI Defender and scan your PC for free

Download and scan now




A Igloo on a computing system is a method of illegally accessing the machine remotely while remaining undetected. These programs are often installed by computer worms or other applications and can be used by attackers to take over the system or execute other malicious activity.





How to manually remove Igloo guide. Only for ADVANCED users.

  • Step 1: Basic check for Igloo activity

    Check running processes on your system. Usually you can find Igloo process running. Use the Ctrl+Shift+Esc buttons combination to open system information window and click Processes tab. Scroll down the whole list and try to find the process named like Igloo. If you find Igloo process running, right click on it and choose “End Process”. It will disable Igloo for the current Windows session, but remember that if you do not completely remove Igloo using next steps, then your PC will stay vulnerable to malware attack. Next steps are much more important in removing Igloo.

  • Step 2: Disconnect your PC from the Internet

    Prevent the malware from leaking or spreading your personal data. Adware usually uses the Internet to transfer all possible and important information you have. Some Adwares are not so “Active” and they can simply disable some Windows features and options. To disconnect your PC from the Internet you need to plug-off LAN cable (if you use LAN connection) or to turn of the Wi-Fi module (if you use Wi-Fi Internet connection). Most of (not 100%) Adwares can not access Wi-Fi module preferences. Turning off the Internet will disable Igloo from transferring any data from your PC.

  • Step 3: Enter the safe mode.

    The next step is very important in removing Igloo. After turning off the Internet and disabling Igloo process you will need to reboot your PC in so-called Safe Mode. Safe Mode is a Windows mode which allows you to start the System using only important applications and services. Safe Mode does not usually allow Igloo to load when the system boots (!!!but exceptions can appear!!!). Choose Restart in Windows Start menu and wait until the screen turns off.

    After that you have to follow the next instructions according to the versions of Microsoft Windows you use:

      Windows XP:
    1. Press the F8 key repeatedly when the first screen appears.

    2. Select Safe Mode from Windows Advanced Options Menu and press ENTER.

      Windows Vista, 7:
    1. Press the F8 key repeatedly when the first screen appears.

    2. Use the arrow keys from Windows Advanced Options Menu in order to select Safe Mode and press ENTER.

      Windows 8, 8.1, 10:
    1. Press and hold the Shift button when left-clicking the Restart button on Windows log-on screen.

    2. Select Safe Mode from Windows Troubleshooting boot screen and press ENTER.

  • Step 4: Removing virus files

    Having booted your PC in Safe mode you have to start cleaning your PC manually by deleting every file associated with Igloo one by one. Here is the list of all files associated with Igloo. Delete all files listed below using the Shift+Delete buttons combination. Always double check the file name as sometimes Adwares use very similar filenames as very important system files do and you can mistakenly remove important system file what will harm your system and you will not be able to boot your PC at all.

    • AdvZip

    • AIM

    • aimcracker.jpg.exe

    • aimcracker.txt.exe

    • aimhacker.jpg.exe

    • aimhacker.txt.exe

    • AMI

    • anastasia_anal.jpg.exe

    • anastasia_anal.txt.exe

    • anastasia_naked.jpg.exe

    • anastasia_naked.txt.exe

    • anastasia_nude.jpg.exe

    • anastasia_nude.txt.exe

    • Autocad

    • Britney.jpg.exe

    • Britney.txt.exe

    • buttman.jpg.exe

    • buttman.txt.exe

    • catherine_zeta_jones_anal.jpg.exe

    • catherine_zeta_jones_anal.txt.exe

    • catherine_zeta_jones_naked.jpg.exe

    • catherine_zeta_jones_naked.txt.exe

    • catherine_zeta_jones_nude.jpg.exe

    • catherine_zeta_jones_nude.txt.exe

    • Counter

    • Delphi

    • Digimon.jpg.exe

    • Digimon.txt.exe

    • divx_fix.jpg.exe

    • divx_fix.txt.exe

    • divx_repair.jpgexe

    • divx_repair.txt.exe

    • edonkey_serverlist.jpg.exe

    • edonkey_serverlist.txt.exe

    • ftp_cracker.jpg.exe

    • ftp_cracker.txt.exe

    • ftp_hacker.jpg.exe

    • ftp_hacker.txt.exe

    • Half_life

    • host_faker.jpg.exe

    • host_faker.txt.exe

    • host_spoofer.jpg.exe

    • host_spoofer.txt.exe

    • Hotmail

    • hotmail_account_sniffer.jpg.exe

    • hotmail_account_sniffer.txt.exe

    • hotmailcracker.jpg.exe

    • hotmailcracker.txt.exe

    • hotmailhacker.jpg.exe

    • hotmailhacker.txt.exe

    • ICQ_Hackingtools.jpg.exe

    • ICQ_Hackingtools.txt.exe

    • icqcracker.jpg.exe

    • icqhacker.jpg.exe

    • icqhacker.txt.exe

    • ident_faker.jpg.exe

    • ident_faker.txt.exe

    • ident_spoofer.jpg.exe

    • ident_spoofer.txt.exe

    • IIS_shellbind_exploit.jpg.exe

    • IIS_shellbind_exploit.txt.exe

    • invisible_IP.jpg.exe

    • invisible_IP.txt.exe

    • ip_faker.jpg.exe

    • ip_faker.txt.exe

    • ip_spoofer.jpg.exe

    • ip_spoofer.txt.exe

    • kazaa.jpg.exe

    • kazaa.txt.exe

    • kmd***_en.jpg.exe

    • kmd***_en.txt.exe

    • linux_root.jpg.exe

    • linux_root.txt.exe

    • Linux_rootaccess.jpg.exe

    • Linux_rootaccess.txt.exe

    • msn_IP_finder.jpg.exe

    • msn_IP_finder.txt.exe

    • msncracker.jpg.exe

    • msncracker.txt.exe

    • msnhacker.jpg.exe

    • msnhacker.txt.exe

    • Office

    • OfficeXP_Keygen.jpg.exe

    • OfficeXP_Keygen.txt.exe

    • pamela_anderson_anal.jpg.exe

    • pamela_anderson_anal.txt.exe

    • pamela_anderson_naked.jpg.exe

    • pamela_anderson_naked.txt.exe

    • pamela_anderson_nude.jpg.exe

    • pamela_anderson_nude.txt.exe

    • Pokemon.jpg.exe

    • Pokemon.txt.exe

    • porn_account_cracker.jpg.exe

    • porn_account_cracker.txt.exe

    • porn_account_hacker.jpg.exe

    • porn_account_hacker.txt.exe

    • PS1

    • PS2

    • PS2_emulator_bleem.jpg.exe

    • PS2_emulator_bleem.txt.exe

    • RealWayToHack.exe

    • sandra_bullock_naked.jpg.exe

    • sandra_bullock_naked.txt.exe

    • sandra_bullock_nude.jpg.exe

    • sandra_bullock_nude.txt.exe

    • sarah_michelle_gellar_naked.txt.exe

    • sarah_michelle_gellar_nakedjpg.exe

    • sarah_michelle_gellar_nude.jpg.exe

    • sarah_michelle_gellar_nude.txt.exe

    • shakira_anal.jpg.exe

    • shakira_anal.txt.exe

    • shakira_assfucked.jpg.exe

    • shakira_assfucked.txt.exe

    • shakira_naked.jpg.exe

    • shakira_naked.txt.exe

    • shakira_nude.jpg.exe

    • shakira_nude.txt.exe

    • shakira_paparazzi_collection.jpg.exe

    • shakira_paparazzi_collection.txt.exe

    • Sub7_masterpwd.jpg.exe

    • Sub7_masterpwd.txt.exe

    • tripod_cracker.jpg.exe

    • tripod_cracker.txt.exe

    • tripod_hacker.jpg.exe

    • tripod_hacker.txt.exe

    • win2k_pass_decryptor.jpg.exe

    • win2k_pass_decryptor.txt.exe

    • Win2k_reboot_exploit.jpg.exe

    • Win2k_reboot_exploit.txt.exe

    • win2k_serial.jpg.exe

    • win2k_serial.txt.exe

    • Windows_Keygen_allver.jpg.exe

    • Windows_Keygen_allver.txt.exe

    • winxp_crack.jpg.exe

    • winxp_crack.txt.exe

    • winxp_cracker.jpg.exe

    • winxp_cracker.txt.exe

    • winxp_hacker.jpg.exe

    • winxp_hacker.txt.exe

    • WinXP_Keygen.jpg.exe

    • WinXP_Keygen.txt.exe

    • winxphack.jpg.exe

    • winxphack.txt.exe

    • Winzip_Pass_Cracker.jpg.exe

    • Winzip_Pass_Cracker.txt.exe

    • Word_Pass_Cracker.jpg.exe

    • Word_Pass_Cracker.txt.exe

    • xbox_emulator_beta.jpg.exe

    • xbox_emulator_beta.txt.exe

    • XP

    • XP_Box_emulator.jpg.exe

    • XP_Box_emulator.txt.exe

    • XP_keygen.jpg.exe

    • XP_keygen.txt.exe

    • yahoo_cracker.jpg.exe

    • yahoo_cracker.txt.exe

    • yahoo_hacker.jpg.exe

    • yahoo_hacker.txt.exe

    • Yahoo_mail_cracker.jpg.exe

    • Yahoo_mail_cracker.txt.exe

    Please, remember that viruses are always progressing and sometimes new files can appear. If you are using our offline PDF guide on How to remove Igloo, please check if you have it’s latest version.

    We do not guarantee that Igloo has the same file structure at the moment of deleting.

    After removing all files associated with Igloo that were listed above, reboot your system in normal mode and check if your PC works fine or you still have any troubles.

    It it is OK – congratulations! You have made a great job!

    If it is still NOT ok – use OSHI Defender to check your PC.

Similar threats

Associated threats

Virus files


The main symptoms of the infection of your computer

Fix all problems

Frequently Asked Questions

We have an answer

  • How does Igloo infect my computer?

  • I detected Igloo on my computer. What do I do?

  • What damage can Igloo do to my computer?

  • What are the main symptoms of Igloo?

  • Can Igloo spread to other computers?

  • Countries with the highest Igloo infection rates.

  • The first recorded appearance of Igloo

I have a question


You have a question?


How does Igloo infect my computer?

Igloo is an Adware-type virus. The most common way a computer becomes infected with Igloo is when a user downloads free software or browser toolbars.

Was the answer helpful?
Was the answer helpful?

I detected Igloo on my computer. What do I do?

If you have OSHI Defender installed on your computer, it will detect and remove Igloo and all related files. First, restart your browser and then check the Home Page to make sure that you’re still using your preferred search engine (Google, Bing, Yahoo, etc.), because Igloo replaces users’ search engines with ones that display ads.

Was the answer helpful?
Was the answer helpful?

What damage can Igloo do to my computer?

Developed by large companies, viruses like Igloo are mostly legal products that hackers use to make money on the ads that Igloo displays on infected computers.

Was the answer helpful?
Was the answer helpful?

What are the main symptoms of Igloo?

High network activity
Unusual browser settings
Pop-up windows

Was the answer helpful?
Was the answer helpful?

Can Igloo spread to other computers?

As a rule, Igloo requires user interaction and cannot automatically infect other computers on your local network or by using the same USB-disk on additional computers. There may be exceptions, though.

Was the answer helpful?
Was the answer helpful?

Countries with the highest Igloo infection rates.


Was the answer helpful?
Was the answer helpful?

The first recorded appearance of Igloo


Was the answer helpful?
Was the answer helpful?


Use the form below to send us your comments and questions

Address: Rm.709, Wellborne Commercial Centre, 8 Java Road, North Point, Hong Kong.

Report a problem

Please provide us with as much information and data as possible (Application name, application version, OSHI Defender version, OS version e.t.c.)

Affiliate program registration

Fill out following form and receive 80% commission per OSHI Defender sale