Malware

Zusy.323365 (file analysis)

Malware Removal

The Zusy.323365 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.323365 virus can do?

  • The binary likely contains encrypted or compressed data.
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Likely virus infection of existing system binary
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Zusy.323365?


File Info:

crc32: 1993E75C
md5: e65c63a1d998962b42d54a520a5ee543
name: E65C63A1D998962B42D54A520A5EE543.mlw
sha1: 9c0e85f2f182fd53e55e867c627688732350b03d
sha256: dd23fd2e291678ac0fabc858bc81ff6b583b244de38531f227c22d9879f55ca0
sha512: b955440f944297a9aa3fb39dab16426fa1b1727b888c71556b270e4315c7b21adb45a98004a78aeeb18b0d644a36c820cee150016e308fa95ea982d20fce830a
ssdeep: 3072:j5afS93tGXRvjxCb5NgXDY7uSlkJcUa7kYQTcqW2NdQQGH/UDhSCUc4aqTBrgmQ:18nlKgzelZNQSBQGH/CSpWqTKmQ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 1999-2003 Microsoft Corporation. All rights reserved.
InternalName: DW20
FileVersion: 11.0.8160
CompanyName: Microsoft Corporation
LegalTrademarks1: Microsoftxae is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windowsxae is a registered trademark of Microsoft Corporation.
ProductName: Microsoft Application Error Reporting
ProductVersion: 11.0.8160
FileDescription: Microsoft Application Error Reporting
OriginalFilename: DW20.Exe
Translation: 0x0000 0x04e4

Zusy.323365 also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.323365
FireEyeGeneric.mg.e65c63a1d998962b
ALYacGen:Variant.Zusy.323365
SangforMalware
K7AntiVirusTrojan ( 0044aaeb1 )
BitDefenderGen:Variant.Zusy.323365
K7GWTrojan ( 0044aaeb1 )
Cybereasonmalicious.1d9989
BaiduWin32.Worm.Agent.bg
CyrenW32/Agent.QP.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:WormX-gen [Wrm]
ClamAVWin.Worm.Generic-9786786-0
KasperskyHEUR:Worm.Win32.Generic
RisingMalware.Undefined!8.C (TFE:4:6jHLgL5E2BS)
Ad-AwareGen:Variant.Zusy.323365
SophosW32/Renamer-I
ComodoWorm.Win32.Agent.NLPA@4t56ql
InvinceaML/PE-A + W32/Renamer-I
McAfee-GW-EditionBehavesLike.Win32.Generic.gt
EmsisoftGen:Variant.Zusy.323365 (B)
GDataGen:Variant.Zusy.323365
JiangminTrojan.Cosmu.acv
WebrootW32.Trojan.Gen
AviraWORM/Agent.2170901
Antiy-AVLGrayWare/Win32.Agent.nlp
ArcabitTrojan.Zusy.D4EF25
ZoneAlarmHEUR:Worm.Win32.Generic
MicrosoftVirus:Win32/Emdup.A
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.ADH.R47876
Acronissuspicious
McAfeeGeneric-FAEY!E65C63A1D998
MAXmalware (ai score=80)
VBA32BScope.Trojan.Cosmu
PandaTrj/Genetic.gen
ZonerTrojan.Win32.82524
ESET-NOD32a variant of Win32/Agent.NLP
TencentMalware.Win32.Gencirc.10b9d88c
YandexTrojan.GenAsa!LdHJgsFIunw
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Agent.NLP!worm
BitDefenderThetaGen:NN.ZexaF.34634.Cq3@ae@RdWp
AVGWin32:WormX-gen [Wrm]
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360HEUR/QVM20.1.540F.Malware.Gen

How to remove Zusy.323365?

Zusy.323365 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment