Generic_c Trojan Horse Removal

This page aims to help you remove Generic_c Trojan Horse. These Generic_c removal instructions work for every version of Windows.

The information in the article below is related to Generic_c. This is a Trojan-based virus that is a very common cyber threat.  That is why we have decided to help the affected users by creating an informative article and a removal guide to help them go through the process of dealing with this kind of malware successfully. We hope we have managed to do that. Trojans represent the biggest group of malware versions ever developed. However, they can be very different from one another when it comes to their purposes. Despite this, they do share some similar traits, which we will list below.


All Trojans are malicious programs. They might get to your system via many diverse means. The most common ones are:

  • Fake update notifications that might indeed resemble the ones generated by your operating system. Actually, these fake updates redirect you to contagious online addresses, from where the virus might come as a drive-by download.
  • Fake online pop-ups and other ads could also lead to places online that contain various kinds of malware, including Generic_c or another version of a Trojan.
  • Suspicious letters and their attachments– in case you come across a suspicious letter (no matter whether it is placed inside your Inbox directory or your Spam folder), ignore it and do not open it. The same applies to its attachments – stay away from them, they might also be infected. In this case, the Trojan that they might contain is often accompanied by a version of Ransomware. This is not the scenario you want to be a part of. Ransomware is super dangerous – it blocks data and you have no guarantee it could ever be decrypted. What’s more, this malware asks you for your money but makes no promise to restore your encrypted data. Having such a combo of malware on your PC could easily turn into a total disaster.
  • Torrents, websites and shareware – these are also other possible ways of spreading Trojans around the web.

The way most Trojans normally act is also a common thing. All of them infect your PC and proceed with their plans in a stealthy way, so that you cannot find out about the infection before it has become too late. In fact, this is the main reason for naming them after the infamous horse from the Trojan War – at first they do not give out any alarming signs and after that – they strike you with the problem they have caused.

What could be the possible consequences of an infection with Generic_c?

The possible issues that might result from a contamination with such a virus could be really diverse. Their number has not been identified, either. Hackers find new ways of exploiting such viruses every day, so that we cannot make a list with all of the possible consequences. Nonetheless, we will at least mention the most widely spread ones:

  • Generic_c could result in destruction and corruption. Trojans might be the reason for the loss of important data. Sometimes the hackers, who distribute and program them, use them for deleting all the files on your system or at least altering them and corrupting them. The effects on your PC might be so serious that an entire reinstall of the OS might be necessary, as your whole computer might be crashed and your files – destroyed.
  • Any Trojan might be used for spying on you personally, or on your online activities. The hackers might be after you personally, as many of them could be prone to physically and mentally abusing people. Also, they might be targeting your accounts credentials, as they might be interested in draining your bank accounts or hijacking your social media profiles. This potential usage of Generic_c is among the truly horrible ones.
  • Trojans could be targeting your work place. In case your PC is connected to your work place network, once infected with a Trojan, the virus might be able to penetrate into the entire network and copy very important sensitive data.
  • The hackers may just need your system resources. These cyber criminals often turn ordinary random computers into bots to exploit their RAM and CPU for whatever purposes. Among them are the spreading of all kinds of spam and crypto currency mining.

What to do to deal with this contamination?

Fortunately, we have already come up with a potential successful solution. Just try following the instructions in our guide below to effectively locate and remove Generic_c from your machine.


Name Generic_c
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Very cruel, mainly because there are most often no real signs of contamination.
Distribution Method  The means of spreading such a virus could vary greatly – from fake ads to spam letters, infected web pages, etc.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.

Generic_c Trojan Horse Removal


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:


Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Press CTRL + SHIFT + ESC simultaneously. Go to the Processes Tab. Try to determine which ones are a virus. Google them or ask us in the comments.


  • This step is very important, because you can catch other threats (like Ransomware and Spyware) while looking for the Adware process.

Right click on each of the virus processes separately and select Open File LocationEnd the process after you open the folder, then delete the directories you were sent to.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random


If all the prior steps fail to help you or you have reason to believe your system is exposed to threats like Ransomware, we advise you to download a professional scanner and remover.

Remember to leave us a comment if you run into any trouble!

Leave a Comment