Trojan

Trojan-Downloader.Win32.Zenlod removal guide

Malware Removal

The Trojan-Downloader.Win32.Zenlod is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.Zenlod virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Forces a created process to be the child of an unrelated process
  • Executed a process and injected code into it, probably while unpacking
  • Queries information on disks, possibly for anti-virtualization
  • A process attempted to delay the analysis task by a long amount of time.
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Steals private information from local Internet browsers
  • Behavior consistent with a dropper attempting to download the next stage.
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

email.yg9.me
ip-api.com
iw.gamegame.info
ol.gamegame.info
edgedl.me.gvt1.com

How to determine Trojan-Downloader.Win32.Zenlod?


File Info:

crc32: 898421AF
md5: 41c69a7f93fbe7edc44fd1b09795fa67
name: 41C69A7F93FBE7EDC44FD1B09795FA67.mlw
sha1: f09309b52d2a067585266ec57a58817b3fc0c9df
sha256: 8b720f6963165f9aca1600e2e3efb04a7162014d0d738fb7f8b9872019f49bd5
sha512: c561b02eb7aeb0e994716a6b046973ac36c3fd004fa2524b402c1a9b09e931cf0db41ec938c808acadefc708e9e6950a7262f4b7f3b60c0083a660f58e0b01a9
ssdeep: 12288:Umn1vBXNJl0P3ZbcCAjqH0d5i+qUH6wyZQMvvdgMiCiT:n1vJNJla39cGH0dg7sOlQCiT
type: PE32 executable (console) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 Logitech, Inc. 2021
InternalName: Logitech G HUB
FileVersion: 2021.6.4851
CompanyName: Logitech, Inc.
ProductName: LGHUB Crashpad Handler
ProductVersion: 2021.6.4851
FileDescription: LGHUB Crashpad Handler
Translation: 0x0409 0x04e4

Trojan-Downloader.Win32.Zenlod also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Inject4.12781
CynetMalicious (score: 99)
ALYacTrojan.GenericKD.46515063
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_80% (W)
K7GWRiskware ( 0040eff71 )
CyrenW32/Trojan.OAML-5751
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastFileRepMalware
KasperskyHEUR:Trojan-Downloader.Win32.Zenlod.gen
BitDefenderTrojan.GenericKD.46515063
MicroWorld-eScanTrojan.GenericKD.46515063
Ad-AwareTrojan.GenericKD.46515063
SophosGeneric PUA PA (PUA)
McAfee-GW-EditionBehavesLike.Win32.Generic.jc
FireEyeGeneric.mg.41c69a7f93fbe7ed
EmsisoftTrojan.GenericKD.46515063 (B)
WebrootW32.Trojan.Gen
AviraTR/AD.Inject.jwrep
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Azorult!ml
AegisLabTrojan.Win32.Zenlod.a!c
GDataTrojan.GenericKD.46515063
McAfeeArtemis!41C69A7F93FB
MAXmalware (ai score=99)
PandaTrj/CI.A
FortinetW32/PossibleThreat
AVGFileRepMalware
Paloaltogeneric.ml

How to remove Trojan-Downloader.Win32.Zenlod?

Trojan-Downloader.Win32.Zenlod removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment