Malware

Zusy.197405 removal

Malware Removal

The Zusy.197405 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.197405 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Starts servers listening on 127.0.0.1:0
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • Attempts to remove evidence of file being downloaded from the Internet
  • Executed a process and injected code into it, probably while unpacking
  • Exhibits behavior characteristics of HawkEye keylogger.
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

Related domains:

z.whorecord.xyz
a.tomx.xyz
whatismyipaddress.com

How to determine Zusy.197405?


File Info:

crc32: C61B16AA
md5: 84e1aa2672e2340095090fcbbe23816d
name: G.Z Trade Co.Ltd.zip
sha1: 599f0415c0602ebd916f59ec61a14f3106fdb03c
sha256: 6697fe6328b5fed7577deee23b91768b4e914918c507ef0ca21d8cc5aa20e4e3
sha512: f59573a515ef4ab7341d2d48e6b7d2fa266bd795207933551a7ceb6140b312f094bb2f7ce7f3a6c488d977e85c1691ddf9c67d1c4f7c88abdd37d08d151a1d05
ssdeep: 12288:0zePmWpVm8z86jOK/JQWoRaaZ84SCG+kPnlDxM3Vh:kePmkkcJXoRTSWkPn9xoh
type: Zip archive data, at least v2.0 to extract

Version Info:

0: [No Data]

Zusy.197405 also known as:

BkavW32.Clodca9.Trojan.de88
CAT-QuickHealTrojanPSW.Heye
McAfeeFareit-FEU!E319116BF2AB
MalwarebytesTrojan.Agent.MSIL
VIPRETrojan.Win32.Generic!BT
AegisLabUds.Dangerousobject.Multi!c
K7AntiVirusTrojan ( 004f1e221 )
K7GWTrojan ( 004f1e221 )
Invinceatrojan.win32.skeeyah.a!rfn
BaiduWin32.Trojan.WisdomEyes.16070401.9500.9996
F-ProtW32/Trojan.SW.gen!Eldorado
SymantecSecurityRisk.gen1
TrendMicro-HouseCallTROJ_GEN.R0E9C0FFG16
AvastWin32:Malware-gen
GDataGen:Variant.Zusy.197405
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.197405
NANO-AntivirusRiskware.Win32.MailPassView.edmrpn
Ad-AwareGen:Variant.Zusy.197405
EmsisoftGen:Variant.Zusy.197405 (B)
ComodoUnclassifiedMalware
F-SecureGen:Variant.Zusy.197405
DrWebTool.MailPassView.236
ZillyaTrojan.Heye.Win32.737
TrendMicroTROJ_GE.D44CABA8
McAfee-GW-EditionBehavesLike.Trojan.hc
SophosTroj/Mdrop-HHN
CyrenW32/Trojan.SW.gen!Eldorado
JiangminTrojan.PSW.Heye.iq
WebrootW32.Trojan.GenKD
AviraTR/Dropper.MSIL.hyyn
Antiy-AVLTrojan[PSW]/Win32.Heye
ArcabitTrojan.Zusy.D3031D
ViRobotTrojan.Win32.Agent.648192.C[h]
MicrosoftTrojanSpy:Win32/Skeeyah.A!rfn
AhnLab-V3Trojan/Win32.MSIL.R183497
VBA32TrojanPSW.Heye
AVwareTrojan.Win32.Generic!BT
ESET-NOD32MSIL/Autorun.Spy.Agent.AU
TencentWin32.Trojan.Inject.Auto
YandexTrojan.PWS.Heye!
IkarusTrojan.Crypt
FortinetMSIL/Injector.PNP!tr
AVGMSIL10.AAWC
PandaTrj/GdSda.A

How to remove Zusy.197405?

Zusy.197405 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment