Malware

Zusy.394705 removal instruction

Malware Removal

The Zusy.394705 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.394705 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Zusy.394705?


File Info:

name: AC5D114CAC180C56FD59.mlw
path: /opt/CAPEv2/storage/binaries/5cef19b9db77f0aaf8dad771bb8fe788fffd766db6905208e689443a5cff0e6c
crc32: 21ED5ACA
md5: ac5d114cac180c56fd59bb146a1b324b
sha1: 11068fa5c84bf4ce205afc6caeca055ba3f148be
sha256: 5cef19b9db77f0aaf8dad771bb8fe788fffd766db6905208e689443a5cff0e6c
sha512: 68b20319a14778b2b5726bce62b53eac0bedcc5379d3d2f96a0c291d5b797db18b488c1c3772055b8b7f9b526d619e6cb8481af5c0adffb41443c65e8633ef68
ssdeep: 12288:P2tctQikR3RG8zveO7Guh8aty/vvz/f1KKBgBn:Pe3XGvaty/j/f1K5
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14115293DEA42DB0FE22000719ABDB2A512243F34CDA17EF7E1E73ABC55BC5535A52606
sha3_384: 771489f27b10f00bf289e9555a98891b2ed6a454540bec7894c6195b48e62510f3fcb9ac8fa07a9b94944d6ecc1fe33f
ep_bytes: 558bec6aff68d0b14600682298460064
timestamp: 2021-07-21 18:57:58

Version Info:

Comments: http://www.the-sz.com/
CompanyName: the sz development
FileDescription: Parkdale
FileVersion: 3.01
InternalName: Parkdale
LegalCopyright: Copyright © 2001-2020
LegalTrademarks:
OriginalFilename: Parkdale.exe
PrivateBuild:
ProductName: the sz development Parkdale
ProductVersion: 3.01
SpecialBuild: The SZ
Translation: 0x0407 0x04b0

Zusy.394705 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.394705
FireEyeGeneric.mg.ac5d114cac180c56
McAfeeGenericRXPM-WI!AC5D114CAC18
CylanceUnsafe
K7AntiVirusTrojan ( 005821bc1 )
K7GWTrojan ( 005821bc1 )
Cybereasonmalicious.5c84bf
BitDefenderThetaGen:NN.ZexaF.34084.3y0@aOKKz9Di
CyrenW32/Kryptik.ERN.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLQM
ClamAVWin.Packed.Zusy-9882005-0
KasperskyHEUR:Trojan.Win32.Staser.gen
BitDefenderGen:Variant.Zusy.394705
SUPERAntiSpywareTrojan.Agent/Gen-Jaik
AvastWin32:CrypterX-gen [Trj]
Ad-AwareGen:Variant.Zusy.394705
SophosMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Generic.cm
EmsisoftGen:Variant.Zusy.394705 (B)
APEXMalicious
GDataWin32.Trojan.PSE.1IAKRUN
AviraHEUR/AGEN.1142521
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R433683
ALYacGen:Variant.Zusy.394705
MAXmalware (ai score=84)
MalwarebytesAdware.DownloadAssistant
RisingTrojan.Kryptik!1.AA55 (CLASSIC)
YandexTrojan.Staser!vCiOXVTMc/w
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Kryptik.HATU!tr
AVGWin32:CrypterX-gen [Trj]
PandaTrj/Genetic.gen
MaxSecureTrojan.Malware.121218.susgen

How to remove Zusy.394705?

Zusy.394705 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment