What is zlh.exe?
zlh.exe is a legitimate process file popularly known as ZLH. It belongs to Norman Security Suite, developed by Norman ASA. It is located in C:\Program Files by default.
Malware programmers write virus files with malicious scripts and save them as zlh.exe with an intention to spread virus on the internet.
Affected Platforms: Windows OS
How to determine if your computer is infected with zlh.exe malware?
Look out for these symptoms to check if your PC is infected with zlh.exe malware:
- Unstable internet connection
- zlh.exe occupies extra CPU space
- PC processing speed slows down
- Browser often redirects to irrelevant websites
- Browser is bombarded with hordes of popup ads
- Computer screen freezes repeatedly
Take the following steps to diagnose your PC for possible zlh.exe malware attack:
Step 1: Simultaneously press CTRL+ALT+DEL keys to open Task Manager.
Step 2: If you notice the file located outside C:\Program Files, perform an antivirus scan to get rid of the malware.
How to remove zlh.exe malware from system using Comodo Antivirus?
Step 1: Download our award-winning Antivirus.
Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.
Step 3: Select Customize Configuration option and arrange installers, configuration, and file location.
Step 4: Restart your PC after the installation gets over
Step 5: Wait for Comodo Internet Security to update the antivirus.
Step 6: Proceed with the quick scan that automatically begins after the update.
Step 7: If threats are found during the scanning, you will be notified through an alert screen.
Step 8: Comodo Antivirus will remove zlh.exe malware from your computer including all other malwares!
No. | Company | File Type | SHA1 | MD5 | Malware Name |
Digitally Signed |
File Version |
Product Version |
Submitted From |
Malware Behavior |
---|---|---|---|---|---|---|---|---|---|---|
1 | Don HO don.h@free.fr | Executable | e40953ec5d89e6b2 6fb07151c779f9e6 5f761161 |
ddda88a524125f27 55cbf7c52fbd794e |
MalCrypt.Ind us! |
No | 1.2.7.0 | 1.2.7.0 | ![]() |
N/A |
2 | N/A | Executable | 023403db68ec91b9 68a1f38765058408 6ea3ebc9 |
10780a2be1749d19 428ea1c742be7843 |
TrojWare.Win 32.FraudPack .alim |
No | N/A | N/A | ![]() |
N/A |
3 | N/A | Executable | 957721d2fee99c3d 2b6a993d84b1d867 d2dd5cf5 |
1a72a86a61c878d5 33d0ff712608b5b1 |
MalCrypt.Ind us! |
No | N/A | N/A | ![]() |
N/A |
- 4 items per page
- 8 items per page
- 16 items per page
- 32 items per page
No. | Company | File Type | SHA1 | MD5 | Digitally Signed |
File Version |
Product Version |
Submitted From |
---|---|---|---|---|---|---|---|---|
1 | Norman ASA | Executable | 6d639d2bd919a3e9 8c01caa8f8f9d1db 2e6356af |
7fc4ec8252004fc1 9bb60c0abdc99e67 |
Yes | 8, 01, 0, 1 |
8, 01, 0, 1 |
![]() |
2 | Norman ASA | Executable | 3bf3a76d04af559a 521fc79ab32a1ac9 aed6b99b |
432cb9c975b78fa5 1dac1e91cd9b8c3a |
Yes | 5, 99, 0, 1 |
5, 99, 0, 1 |
![]() |
3 | N/A | Executable | 5801a58a6b4d8c26 49a75b9040585fad c79adae1 |
6a559c6b16dc3eff 418b8465769bc926 |
No | N/A | N/A | ![]() |
4 | N/A | Executable | 1aaed85450e2ddac d99cbe9a7f55209e 161ec906 |
dcd8b37890673f3f b099e8372553c225 |
No | N/A | N/A | ![]() |