Other:Malware-gen [Trj] (Removal Instructions) - Free Guide

Other:Malware-gen [Trj] Removal Guide

What is Other:Malware-gen [Trj]?

Other:Malware-gen [Trj] – a heuristic detection name for malware that can be encountered on various websites

Other:Malware-gen [Trj]Other:Malware-gen [Trj] is a malicious program that might steal sensitive data or install other malware on the infected system, although can also indicate a false-positive

Other:Malware-gen [Trj] is a computer infection that defines a particular type of computer applications or malicious online connections that can occur via Google Chrome or another web browser. The name is typically used by Avast or AVG security software and is typically connected to various browser-related components that might have been dropped by malicious scripts on various sites. Users started to complain that the pop-up shows up as soon as they try to access relatively harmless websites, or even with every browser launch.

While Other:Malware-gen [Trj] might also be a false-positive (in most cases, it occurs due to corrupted AV program files or outdated database), it is important to investigate each case carefully, as it might indicate malware. Nevertheless, it is possible to double-check it by scanning the device with a different security tool and then adding the particular website to exclusion if it is a false positive.

Name Other:Malware-gen [Trj]
Type Malware (could be a false-positive)
Detected by Avast and AVG
Related Win32:Malware-gen, Hacktool:win32/keygen, Win32:Dropper-gen
Infiltration The detection might pop-up at any time and might stem from malicious browser extensions, installed apps, or various components stored within the browser. PUPs are malware that can be installed in various different ways, including software bundles, spam emails, exploits, fake updates, etc.
Symptoms In the case of a Trojan infection, users are highly unlikely to experience visible infection symptoms, although it is possible to observe suspicious processes running in the background, as well as computer errors or crashes. However, in most cases, users only experience Other:Malware-gen [Trj] pop-ups regularly
Removal There are several methods to eliminate the detection pop-ups. Scan your machine with another anti-malware software and then add an exclusion if it is a false-positive. Otherwise, reset Chrome Sync or the web browser itself
System fix If you machine was infected with malware, repair the damage done to it with tools like FortectIntego

Users can only see the Other:Malware-gen [Trj] detection if they have particular security applications installed on their devices. In most cases, the source for the detection seems to be Chrome.exe, although the websites that are detected as malicious can vary.

Users claimed that Other:Malware-gen [Trj] pop-ups constantly return, even after the security software detects and seemingly sends the detected items to the quarantine. However, once the quarantine is checked, no files are shown inside. Nevertheless, users are soon reminded about the same issue, and they do not know how to remove Other:Malware-gen [Trj] once and for all.

In case Other:Malware-gen [Trj] is not a false-positive, it can be a result of real Trojan infection. These types of malicious applications are usually disguised as something legitimate, such as email attachment from a seemingly reliable source, or a useful application that was placed on a third-party website. In some cases, users can encounter Trojans when they download software cracks or keygens – these are particularly dangerous as there is no way for a regular user to check whether such tools would actually result in malware infection.

Trojans such as Other Malware Gen Trj can be set to perform a variety of different tasks on the infected machine. Typically, the infection routine starts and completes very quickly, all while the Windows changes are applied in the background without users' noticing.

Depending on malware's features, Trojans can usually perform the following tasks on the infected machines:

  • Establish background connections to remote Command & Control servers[1] controlled by hackers;
  • Steal financial information, browser cookies, crypto-wallet data, etc.;
  • Take screenshots and use video camera remotely;
  • Proliferate other malware, such as ransomware, behind users' backs;
  • Gain elevated privileges within the system, which allows the attackers to move laterally within the network if such exists;
  • Send spam and connect the affected machine to a botnet,[2] etc.

As evident, Other:Malware-gen [Trj] infection can cause serious financial losses, compromise privacy, and result in personal data loss. Therefore, it is vital to ensure that Trojans do not gain access to your system.

Other:Malware-gen [Trj] virusOther:Malware-gen [Trj] is a detection name for malicious files and components that can originate from various websites

Since the detection of this kind can mean many things, there are also many ways to perform Other:Malware-gen [Trj] removal. First of all, it is important to make sure as your security software is running on the latest version, as new definitions and updates ensure that false-positives are eliminated and do not bug users.

If the Other:Malware-gen [Trj] virus detection is still present, we highly advise performing a full system scan with another security software, such as SpyHunter 5Combo Cleaner or Malwarebytes. This second check will help to confirm or deny malware prescience on the system. In case nothing is found, it is highly likely to be a false-positive, although we do recommend contacting the AV maker if some doubts remain. Finally, if your computer was indeed infected, eliminate malware and then fix the damage that was done to system files with FortectIntego.

In some cases, there might be some files that are hidden within Google's servers. In such a case, it is recommended to reset sync of the account. For more instructions, please check the bottom section of the article.

Prevent malware infections on your machine

Trojans are typically advanced malware infections that can initiate thousands of changes to the infected machine without producing any symptoms. This happens because these malicious apps are programmed to work stealthy, although it is no secret that there is a lot of badly coded malware that would instantly give away its presence or simply crash the computer. In some cases, however, this might be even worse than the infection itself, as broken code might permanently corrupt vital system files.

Nevertheless, users should not get infected with Trojans in the first place, and for that, multiple security measures should be applied when browsing the internet or even checking your inbox. Here are several tips provided by security experts from dieviren.de:[3]

  • Employ a reliable anti-malware software and keep it updated at all times;
  • Apply security patches as soon as Microsoft releases new updates;
  • Do not allow spam email attachments to run macros or click on links embedded inside the email;
  • Protect all your accounts with strong passwords and never reuse them;
  • Do not click on links that come via IM applications or social media platforms.

Get rid of Other:Malware-gen [Trj] in one way or another

To remove Other:Malware-gen [Trj] from your machine, you should first perform a full system scan with another security software and also ensure that your security software that shows pop-ups is up-to-date. Avast and AVG did state that several domains where whitelisted after users reported that it was a false-positive.

In case another AV tool did not find any infections, we recommend going to Chrome's Sync page and resetting sync of your account so that the data on the servers would be eliminated at once.

Other:Malware-gen [Trj] - reset Chrome syncReset Chrome sync to get rid of Other:Malware-gen [Trj] pop-ups

Another method to remove Other:Malware-gen [Trj] is to reset the installed web browsers – we provide detailed instructions below. Some components are stored within the web browser's settings and can only be eliminated with a full browser reset.

You may remove virus damage with a help of FortectIntego. SpyHunter 5Combo Cleaner and Malwarebytes are recommended to detect potentially unwanted programs and viruses with all their files and registry entries that are related to them.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Other:Malware-gen [Trj]. Follow these steps

Remove from Microsoft Edge

Delete unwanted extensions from MS Edge:

  1. Select Menu (three horizontal dots at the top-right of the browser window) and pick Extensions.
  2. From the list, pick the extension and click on the Gear icon.
  3. Click on Uninstall at the bottom. Remove extensions from Edge

Clear cookies and other browser data:

  1. Click on the Menu (three horizontal dots at the top-right of the browser window) and select Privacy & security.
  2. Under Clear browsing data, pick Choose what to clear.
  3. Select everything (apart from passwords, although you might want to include Media licenses as well, if applicable) and click on Clear. Clear Edge browsing data

Restore new tab and homepage settings:

  1. Click the menu icon and choose Settings.
  2. Then find On startup section.
  3. Click Disable if you found any suspicious domain.

Reset MS Edge if the above steps did not work:

  1. Press on Ctrl + Shift + Esc to open Task Manager.
  2. Click on More details arrow at the bottom of the window.
  3. Select Details tab.
  4. Now scroll down and locate every entry with Microsoft Edge name in it. Right-click on each of them and select End Task to stop MS Edge from running. Reset MS Edge

If this solution failed to help you, you need to use an advanced Edge reset method. Note that you need to backup your data before proceeding.

  1. Find the following folder on your computer: C:\\Users\\%username%\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe.
  2. Press Ctrl + A on your keyboard to select all folders.
  3. Right-click on them and pick Delete Advanced MS Edge reset 1
  4. Now right-click on the Start button and pick Windows PowerShell (Admin).
  5. When the new window opens, copy and paste the following command, and then press Enter:

    Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\\AppXManifest.xml” -Verbose Advanced MS Edge reset 2

Instructions for Chromium-based Edge

Delete extensions from MS Edge (Chromium):

  1. Open Edge and click select Settings > Extensions.
  2. Delete unwanted extensions by clicking Remove. Remove extensions from Chromium Edge

Clear cache and site data:

  1. Click on Menu and go to Settings.
  2. Select Privacy, search and services.
  3. Under Clear browsing data, pick Choose what to clear.
  4. Under Time range, pick All time.
  5. Select Clear now. Clear browser data from Chroum Edge

Reset Chromium-based MS Edge:

  1. Click on Menu and select Settings.
  2. On the left side, pick Reset settings.
  3. Select Restore settings to their default values.
  4. Confirm with Reset. Reset Chromium Edge

Remove from Mozilla Firefox (FF)

To reset Mozilla Firefox, please follow these steps:

Remove dangerous extensions:

  1. Open Mozilla Firefox browser and click on the Menu (three horizontal lines at the top-right of the window).
  2. Select Add-ons.
  3. In here, select unwanted plugin and click Remove. Remove extensions from Firefox

Reset the homepage:

  1. Click three horizontal lines at the top right corner to open the menu.
  2. Choose Options.
  3. Under Home options, enter your preferred site that will open every time you newly open the Mozilla Firefox.

Clear cookies and site data:

  1. Click Menu and pick Settings.
  2. Go to Privacy & Security section.
  3. Scroll down to locate Cookies and Site Data.
  4. Click on Clear Data…
  5. Select Cookies and Site Data, as well as Cached Web Content and press Clear. Clear cookies and site data from Firefox

Reset Mozilla Firefox

If clearing the browser as explained above did not help, reset Mozilla Firefox:

  1. Open Mozilla Firefox browser and click the Menu.
  2. Go to Help and then choose Troubleshooting Information. Reset Firefox 1
  3. Under Give Firefox a tune up section, click on Refresh Firefox…
  4. Once the pop-up shows up, confirm the action by pressing on Refresh Firefox. Reset Firefox 2

Remove from Google Chrome

Reset Google Chrome if the Other: Malware-gen pop-ups keep coming back:[Trj]

Delete malicious extensions from Google Chrome:

  1. Open Google Chrome, click on the Menu (three vertical dots at the top-right corner) and select More tools > Extensions.
  2. In the newly opened window, you will see all the installed extensions. Uninstall all the suspicious plugins that might be related to the unwanted program by clicking Remove. Remove extensions from Chrome

Clear cache and web data from Chrome:

  1. Click on Menu and pick Settings.
  2. Under Privacy and security, select Clear browsing data.
  3. Select Browsing history, Cookies and other site data, as well as Cached images and files.
  4. Click Clear data. Clear cache and web data from Chrome

Change your homepage:

  1. Click menu and choose Settings.
  2. Look for a suspicious site in the On startup section.
  3. Click on Open a specific or set of pages and click on three dots to find the Remove option.

Reset Google Chrome:

If the previous methods did not help you, reset Google Chrome to eliminate all the unwanted components:

  1. Click on Menu and select Settings.
  2. In the Settings, scroll down and click Advanced.
  3. Scroll down and locate Reset and clean up section.
  4. Now click Restore settings to their original defaults.
  5. Confirm with Reset settings. Reset Chrome 2

Delete from Safari

Remove unwanted extensions from Safari:

  1. Click Safari > Preferences…
  2. In the new window, pick Extensions.
  3. Select the unwanted extension and select Uninstall. Remove extensions from Safari

Clear cookies and other website data from Safari:

  1. Click Safari > Clear History…
  2. From the drop-down menu under Clear, pick all history.
  3. Confirm with Clear History. Clear cookies and website data from Safari

Reset Safari if the above-mentioned steps did not help you:

  1. Click Safari > Preferences…
  2. Go to Advanced tab.
  3. Tick the Show Develop menu in menu bar.
  4. From the menu bar, click Develop, and then select Empty Caches. Reset Safari

After uninstalling this potentially unwanted program (PUP) and fixing each of your web browsers, we recommend you to scan your PC system with a reputable anti-spyware. This will help you to get rid of Other:Malware-gen [Trj] registry traces and will also identify related parasites or possible malware infections on your computer. For that you can use our top-rated malware remover: FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes.

How to prevent from getting malware

Stream videos without limitations, no matter where you are

There are multiple parties that could find out almost anything about you by checking your online activity. While this is highly unlikely, advertisers and tech companies are constantly tracking you online. The first step to privacy should be a secure browser that focuses on tracker reduction to a minimum.

Even if you employ a secure browser, you will not be able to access websites that are restricted due to local government laws or other reasons. In other words, you may not be able to stream Disney+ or US-based Netflix in some countries. To bypass these restrictions, you can employ a powerful Private Internet Access VPN, which provides dedicated servers for torrenting and streaming, not slowing you down in the process.

Data backups are important – recover your lost files

Ransomware is one of the biggest threats to personal data. Once it is executed on a machine, it launches a sophisticated encryption algorithm that locks all your files, although it does not destroy them. The most common misconception is that anti-malware software can return files to their previous states. This is not true, however, and data remains locked after the malicious payload is deleted.

While regular data backups are the only secure method to recover your files after a ransomware attack, tools such as Data Recovery Pro can also be effective and restore at least some of your lost data.

About the author
Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions