Trojan

Should I remove “Trojan.Win32.Runner.izm”?

Malware Removal

The Trojan.Win32.Runner.izm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Runner.izm virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Detected script timer window indicative of sleep style evasion
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Creates a hidden or system file
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

lu1.asia
asu04.shop
asu03.xyz
lu0.viewdns.net
edgedl.me.gvt1.com

How to determine Trojan.Win32.Runner.izm?


File Info:

crc32: 59679B21
md5: 79fa77b796300ef5bafb6bcee46fc30f
name: 79FA77B796300EF5BAFB6BCEE46FC30F.mlw
sha1: e6ba2132d8058c0532492da00aaec117fff56df4
sha256: 4c99457625e752a03693aab64e2b5129eff89872c649194e81bd87809ed1ae13
sha512: 0ae044695cffc50eb1c112ee85e37d0e0c9779c4f6bbbbabb6cd85771ac408414dfd3f804f8175fb56a6d995b259f830cbd6f2380cecb08975955e63f0204faf
ssdeep: 48:67GIUX0zqZQ2ihLibUX0YJyhcaaualaBSh:SUXkfgUXs/peaA
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows

Version Info:

0: [No Data]

Trojan.Win32.Runner.izm also known as:

BkavW32.AIDetect.malware1
K7AntiVirusRiskware ( 0040eff71 )
LionicTrojan.Win32.Runner.4!c
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader40.42841
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Runner
ALYacTrojan.GenericKD.37167605
CylanceUnsafe
ZillyaTrojan.Runner.Win32.3137
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaTrojan:Win32/Runner.95f5b4b5
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.2d8058
CyrenW32/Trojan.WBWY-4803
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/TrojanDownloader.Agent.FSG
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan.Win32.Runner.izm
BitDefenderTrojan.GenericKD.37167605
NANO-AntivirusTrojan.Win32.Runner.ixfyzh
ViRobotTrojan.Win32.Z.Undef.3072
MicroWorld-eScanTrojan.GenericKD.37167605
TencentWin32.Trojan.Runner.Alta
Ad-AwareTrojan.GenericKD.37167605
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZexaF.34796.aiW@auYDK1i
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R011C0WG321
McAfee-GW-EditionRDN/Generic.grp
FireEyeGeneric.mg.79fa77b796300ef5
EmsisoftTrojan.GenericKD.37167605 (B)
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Runner.ge
AviraTR/Runner.liusc
eGambitUnsafe.AI_Score_99%
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Bomitag.D!ml
GDataTrojan.GenericKD.37167605
AhnLab-V3Trojan/Win.Generic.C4540400
McAfeeRDN/Generic.grp
MAXmalware (ai score=88)
VBA32Trojan.Runner
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R011C0WG321
MaxSecureTrojan.Malware.119319747.susgen
FortinetPossibleThreat.MU
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Heur.Generic.HxQBR9sA

How to remove Trojan.Win32.Runner.izm?

Trojan.Win32.Runner.izm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment