Generic_r.EIC Removal Manual - How to, Technology and PC Security Forum |

Generic_r.EIC Removal Manual

Generic_r.EIC is a Trojan horse that enters the user’s system via junk email messages, bundled with free applications or through corrupted web pages. Generic_r.EIC can lead do poor system performance, delete certain files on the affected system, and steal private information. Trojans are highly feared because their ability to connect to a remote server and grant cyber criminals access to the compromised machine. The removal of Generic_r.EIC from the infected PC is imperative. To do so, experts recommend the use of a powerful anti-malware application.

Download a System Scanner, to See If Your System Has Been Affected By Generic_r.EIC.

Generic_r.EIC has been detected by several AV solutions as:

  • UDS:DangerousObject.Multi.Generic by Kaspersky
  • Artemis!DF82BB1F8F41 by McAfee
  • Win32:Adware-gen [Adw] by Avast
  • Gen:Variant.Adware.Symmi.46887 by BitDefender
  • A variant of Win32/Adware.MultiPlug.DX by ESET-NOD32
  • Gen:Variant.Adware.Symmi.46887 by F-Secure

Generic_r.EIC Distribution

As many other Trojans, Generic_r.EIC enters the targeted system as an attachment to a spam email message or as the user visits a corrupted website. Generic_r.EIC can also be delivered as a part of a freeware bundle. Experts warn about stealth installations of questionable or even malicious software and recommend the Custom installation options. Users are advised to pick their download sources carefully and never to open emails from unfamiliar senders.

Generic_r.EIC Symptoms

Reportedly Generic_r.EIC affects computers running Windows XP, Windows 7, Windows 8.1, and Windows Vista. The Trojan is known to cause the following issues on the affected machine:


  • Lead to poor system performance.
  • Modify and delete random files.
  • Open a back door and connect to a remote server.
  • Install software on the PC.
  • Block the Internet connection.
  • Steal sensitive data.

How to Remove Generic_r.EIC from Your Computer?

Malware experts warn that removing Trojans from your computer requires technical skills above the average. Installing a powerful anti-spyware solution and running it in Safe Mode is recommended, due to some Trojan’s ability to block AV applications that were active at the time of the threat’s infiltration. Follow the instructions below to delete Generic_r.EIC permanently.

Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool. Find Out More About SpyHunter Anti-Malware Tool

1. Start Your PC in Safe Mode to Remove Generic_r.EIC

1. Start Your PC in Safe Mode to Remove Generic_r.EIC.

1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
2. Select one of the two options provided below:

For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.

For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.

3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.
4. Log on to your computer using your administrator account

While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.

2. Remove Generic_r.EIC automatically with Spy Hunter Malware - Removal Tool.

2. Remove Generic_r.EIC automatically with Spy Hunter Malware – Removal Tool.

To clean your computer with the award-winning software Spy Hunter – donload_now_140
It is highly recommended to run a system scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share