7-day Free Trial w/Credit card, no charge upfront or if you cancel up to 2 days before expiration; Subscription price varies per region w/ auto renewal unless you timely cancel; notification before you are billed; 30-day money-back guarantee; Read full terms and more information about free remover.

*Source of claim SH can remove it.


Trojan.GenericKDZ belongs to the most treacherous malware category of them all – that of the Trojan horse viruses. As such, Trojan.GenericKDZ is highly dangerous and should be removed immediately from your system.

Trojan.generickdz 1024x706
Trojan.GenericKDZ detected by antivirus programs in VirusTotal

Below we have included a detailed removal guide that will show you how to locate and remove this piece of malware from your PC. However, keep in mind that the process involves dealing with system files and accidentally deleting the wrong thing may result in permanent damage to your OS. Therefore, a certain degree of tech-savviness is required here, and if you don’t feel like you should risk it – we have a professional malware removal tool available for you as well.

But back to Trojan.GenericKDZ, you may be wondering how this Trojan horse got into your computer and what it’s been up to.

There are multiple distribution channels for viruses of this type, including pirated content that you can download for free from dubious sources such as torrent sites, for example. But the most common means of landing an infection with something like Trojan.GenericKDZ is usually either through spam messages or through malicious online ads better known as malvertisements.

In the case of the former, the Trojan will usually be present in an attached file that seems fairly harmless on the outside. It can be a text document, a pdf file or an archive, for instance, but the second you download it on your computer – you will have downloaded the Trojan inside it as well. Therefore, be very careful with any incoming messages that come with an enclosed attachment or a link. And in that same line of thought, we would also advise you to try and not interact with any online ads you see when browsing the web. There’s no way to tell the legitimate ones apart from those that will lead to a dangerous infection, so better safe than sorry.

What to expect from Trojan.GenericKDZ

The Trojan.GenericKDZ malware is notorious for two things. It is incredibly stealthy, meaning that this infection typically lack any symptoms and it can operate on your system for an indefinite amount of time without being noticed. And the other thing is that Trojan.GenericKDZ is endlessly versatile.

A Trojan like Trojan.GenericKDZ, Great Discover, Walliant can be employed for such as wide variety of different harmful tasks that we couldn’t possibly cover them all in this short post.

But we can outline some of the most common usages and these include theft, espionage and system resource exploitation, to name just a few. A malicious piece like Trojan.GenericKDZ can be set to monitor your traffic, log your keystrokes and even listen in on your conversations or spy on you via your webcam. And with the help of these methods, the hackers behind the virus can gain access to sensitive information, including financial credentials, login details, etc.

In addition, a Trojan horse can also turn your computer into a bot and make it serve its masters remotely for whatever purposes. For example, it can be made to distribute spam or mine cryptocurrencies.


Detection Tool

*Source of claim SH can remove it.

Remove Trojan.GenericKDZ

Trojans are stealthy threats that tend to invade different parts of the system by secretly installing malicious components in various directories. Therefore, the detection and the removal of a sophisticated threat like Trojan.GenericKDZ requires you to pay close attention to everything unusual and delete any app or a process that could be related to it. One of the first things experts recommend you to do to remove Trojan.GenericKDZ is to check your programs’ list for recently added or suspcious-looking entries and uninstall them if they turn out to be part of the Trojan infection.

For that, press the Windows Key and R simultaneously and type appwiz.cpl in the Run window:


Clikc the OK button to run the command and you will find yourself in Control Panel>>> Programs and Features >>>Uninstall a Program.

In there, look for suspicious programs that you can’t remember installing, as well as programs you have recently installed from unreliable sources that you believe might be linked to the infection.  As soon as you find anything suspicious, do quick online research to learn more about the program and then, based on the information that you collect, decide if you want to Uninstall it.

In case a message like the one below pops up when you click Uninstall, make sure you select choose NO and complete the uninstallation process of the unwanted program with attention to every step or checkmark related to additional components that might have come along with it.


If Trojan.GenericKDZ is still present on the system after you uninstall all the programs that look disturbing to you, this might mean that the Trojan has added malicious components in other locations of the system. To find and remove these components, please, use the detailed removal instructions in the advanced guide below.


For your convenience, we recommend that you Bookmark this page in your browser, so you can refer back to it after the multiple system reboots that will be required during the steps below.

Next, it is advisable to reboot the infected computer in Safe Mode to limit the activity of the Trojan’s processes as much as possible.



*Source of claim SH can remove it.

Next, start the Task Manager (CTRL + SHIFT + ESC) and view the active processes in the Processes Tab. It may be hard to determine which of them are dangerous just by looking at them because the Trojan may use different names to camouflage its malicious activities. Therefore, the best way to figure out if a particular process is malicious is to right-click on it and open its File Location folder:


Once you see the files in that folder, scan them all with the powerful online virus scanner below:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    If they are indeed malicious, immediately end the process they are linked to (right-click on the process>End Process) and delete its File Location folder

    If needed, scan each process in the list that grabs your attention and looks suspicious until you are sure there are no Trojan.GenericKDZ-related entries in the Task Manager that are running.


    *Source of claim SH can remove it.

    It is common for a Trojan like Trojan.GenericKDZ to make changes in system files without notice or any indications about the applied alternations. One of the files where such changes may take place is the Hosts file of your computer. To check it, first press the Windows and R keys from the keyboard and paste the line below in the Run box that gets open:

    notepad %windir%/system32/Drivers/etc/hosts

    Click the OK button and scroll the text of the Hosts file that appears on the screen until you find where it is written Localhost. If Trojan.GenericKDZ has made changes in the file, this is where it is most likely to see them. A compromised computer may have a bunch of strange-looking IP addresses under Localhost.

    hosts_opt (1)

    If you detect anything like that in your Hosts file, please, leave us a comment with a copy of the questionable IP addresses, so we can take a look at them and advise you on what to do.


    Many Trojans may add malicious Startup Items to the system with the idea that these items start running as soon as the computer reboots. Trojan.GenericKDZ is not an exception, therefore, you need to check the configurations of your system for such entries.

    The easiest way to do that is to type msconfig in the search field of the Start menu and hit enter.


    Next, in Startup carefully check the listed Startup Items and if you detect anything suspicious, remove its checkmark and click OK.


    Last, but not least important, is to search the Registry of your system for traces of the Trojan and entries linked to it and remove them. If you haven’t dealt with Registry files before, know that any wrong changes and deletions there may corrupt your system in a very serious way. Therefore, in case of doubts on what exactly needs to be removed from the Registry, better use a professional removal tool that can clean the malicious files without damaging the system.

    If you want to use the manual method anyways, start with typing Regedit in the search field of the Start menu and press Enter.

    Next, with CTRL and F, open a Find dialog box inside the Registry Editor and write the name of the Trojan in it.

    Start a search and if anything gets found with that name, delete it with a right-click. Then, repeat the search again until nothing gets found.

    Next, go an extra mile and manually check the following directories from the left panel for any random entries:

    • HKEY_CURRENT_USER–Software–Random Directory
    • HKEY_CURRENT_USER–Software–Microsoft–Windows–CurrentVersion–Run–Random
    • HKEY_CURRENT_USER–Software–Microsoft–Internet Explorer–Main–Random

    If you find anything unusual in each of them, then it most likely might be linked to Trojan.GenericKDZ and needs to be deleted. Just be careful what you remove as, once again, meddling with Registry files in a wrong way may cause more harm than good.

    In the off chance that this manual removal guide doesn’t help, please consider downloading the powerful anti-virus program we recommend on this page or try our free online virus scanner to check your computer for any hidden components that are helping the Trojan to remain on your system.


    About the author


    Violet George

    Violet is an active writer with a passion for all things cyber security. She enjoys helping victims of computer virus infections remove them and successfully deal with the aftermath of the attacks. But most importantly, Violet makes it her priority to spend time educating people on privacy issues and maintaining the safety of their computers. It is her firm belief that by spreading this information, she can empower web users to effectively protect their personal data and their devices from hackers and cybercriminals.

    Leave a Comment

    We are here to help! Use SpyHunter to remove malware in under 15 minutes.

    Not Your OS? Download for Windows® and Mac®.

    * See Free Trial offer details and alternative Free offer here.

    ** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

    Spyware Helpdesk 1