Malware

Zusy.480518 removal

Malware Removal

The Zusy.480518 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.480518 virus can do?

  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Zusy.480518?


File Info:

name: FA4D7C962964184CE91C.mlw
path: /opt/CAPEv2/storage/binaries/37506034ed9abd6542490777b13f906dbf3735b8c530047e7b72b9f4466c66c1
crc32: 140532EB
md5: fa4d7c962964184ce91c2fc5b23d0f90
sha1: 2b58a7fac2db5022c4e600154f707d9cbdb9176c
sha256: 37506034ed9abd6542490777b13f906dbf3735b8c530047e7b72b9f4466c66c1
sha512: 0627f88609ec7765fcf52dbb66201db7ab6fc767a0c6cdf0e5da8bcef58be346f3cdadf89c1d6aeb1cfb0af731adc5b47d3598b08635d2458339c7a3132097ba
ssdeep: 98304:9Elfs2XFb4jgishu4UwMAvpYIFk9ZfYzbH4wy0L6OC9O3coosGoVqbuaJ0KDsNaW:m7o0umvCudL6OC9o00hNa6bbXJVb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FA86BFE271C091BBC01EC7345366FE3EA96FBD7105358493BA98F9755E32C80266AE0D
sha3_384: 226bbb1c1d407b58f651e5e1b594f5177d4d19359ee551309a9c654def10fb083a0b2fa83a5376c671df0884b3d1692a
ep_bytes: 558bec6aff68d897aa0068aca34f0064
timestamp: 2023-07-19 13:55:44

Version Info:

FileVersion: 1.0.0.0
FileDescription: 易语言程序
ProductName: 易语言程序
ProductVersion: 1.0.0.0
LegalCopyright: 作者版权所有 请尊重并使用正版
Comments: 本程序使用易语言编写(http://www.eyuyan.com)
Translation: 0x0804 0x04b0

Zusy.480518 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.lIa2
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Zusy.480518
FireEyeGeneric.mg.fa4d7c962964184c
CAT-QuickHealTrojan.Generic.2919
SkyhighBehavesLike.Win32.Generic.wh
McAfeeArtemis!FA4D7C962964
Cylanceunsafe
SangforTrojan.Win32.Save.BlackMoon
K7AntiVirusTrojan ( 005246d51 )
K7GWTrojan ( 005246d51 )
Cybereasonmalicious.ac2db5
BitDefenderThetaGen:NN.ZexaF.36792.@t0@aqbNuTgb
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/FlyStudio.HackTool.A potentially unwanted
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Dropper.Tiggre-9845940-0
KasperskyUDS:Trojan.Win32.Reconyc.gen
BitDefenderGen:Variant.Zusy.480518
AvastWin32:TrojanX-gen [Trj]
SophosMal/Generic-S
DrWebTrojan.Rootkit.22087
VIPREGen:Variant.Zusy.480518
TrendMicroTROJ_GEN.R002C0WHI23
Trapminesuspicious.low.ml.score
EmsisoftApplication.Generic (A)
IkarusTrojan.Win32.Agent
VaristW32/Trojan.GRW.gen!Eldorado
Antiy-AVLTrojan/Win32.FlyStudio.a
MicrosoftTrojan:Win32/Wacatac.B!ml
XcitiumTrojWare.Win32.Agent.OSCF@5rs7jr
ArcabitTrojan.Zusy.D75506
ZoneAlarmUDS:Trojan.Win32.Reconyc.gen
GDataWin32.Trojan.PSE.1H6ZYWO
GoogleDetected
AhnLab-V3Trojan/Win.TrojanX-gen.C5450939
Acronissuspicious
VBA32BScope.Trojan.Downloader
ALYacGen:Variant.Zusy.480518
MAXmalware (ai score=85)
MalwarebytesGeneric.Malware.AI.DDS
TrendMicro-HouseCallTROJ_GEN.R002C0WHI23
RisingTrojan.MalCert!1.DEBF (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureDropper.Dinwod.frindll
FortinetW32/CoinMiner.PHP!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Zusy.480518?

Zusy.480518 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment