Malware

What is “Zusy.486490”?

Malware Removal

The Zusy.486490 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.486490 virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Zusy.486490?


File Info:

name: EBC22826AE9441EBF15A.mlw
path: /opt/CAPEv2/storage/binaries/237f4014c5d3a7f28e50b188a2ffbc2217778921a4a398b8980b533ae147eec6
crc32: BC1E689A
md5: ebc22826ae9441ebf15abeb8afe1d4b5
sha1: 459ea7773707f16facf662ca3ff3e2d89f23d2d4
sha256: 237f4014c5d3a7f28e50b188a2ffbc2217778921a4a398b8980b533ae147eec6
sha512: cfe620dec166935bb50240f6bb533ab42a32baafaf772f1102a0b8d6b7e0919d4589aaeea0b4afed55a828f9915cbbc49ae205f879a8b97e1b31be808afe9f23
ssdeep: 768:l7B0BLekAR68UgvlGaQMIqBHFL3hQ6MdLHFWrZw5ynhw3re6KA2uMS5garq1uroE:5BwykgPUgoaPI6BdnCL3vdoPyzQbeJ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D4937C4AFB47D0E0E62665F0949AD77B4532FE238421EA7AFF4876CCFD32640950A1C9
sha3_384: 1ff80a6feee5280e644855f07dbe58a68debe2bffb6a742e24f602bd468a2bed2763259e43dfdd5673645710bbe53575
ep_bytes: c7056cd0400001000000e9b1fcffff90
timestamp: 2022-12-07 03:25:53

Version Info:

Translation: 0x0000 0x04b0
Comments: Internet Download Manager
CompanyName: Tonec Inc.
FileDescription: Internet Download Manager
FileVersion: 6.21.1.3
InternalName: idman.exe.exe
LegalCopyright: Tonec Inc., Copyright © 1999 - 2022
LegalTrademarks: IDMan.exe
OriginalFilename: idman.exe.exe
ProductName: Internet Download Manager (IDM)
ProductVersion: 6.21.1.3
Assembly Version: 6.21.1.3

Zusy.486490 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Zusy.4!c
MicroWorld-eScanGen:Variant.Zusy.486490
ClamAVWin.Malware.Jaik-10008168-0
FireEyeGeneric.mg.ebc22826ae9441eb
McAfeeGenericRXAA-AA!EBC22826AE94
Cylanceunsafe
SangforTrojan.Win32.Zusy.V7pm
K7AntiVirusTrojan ( 005799f81 )
AlibabaTrojan:Win32/MalOb.d1353d98
K7GWTrojan ( 005799f81 )
BitDefenderThetaGen:NN.ZexaF.36738.fO0@aKsx7gc
CyrenW32/Rozena.HB.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Agent.UQC
CynetMalicious (score: 100)
BitDefenderGen:Variant.Zusy.486490
AvastWin32:MalOb-IJ [Cryp]
TencentTrojan.Win32.Agent.hdf
TACHYONTrojan/W32.Agent.93696.AIS
EmsisoftGen:Variant.Zusy.486490 (B)
F-SecureTrojan.TR/Agent.kxqdc
VIPREGen:Variant.Zusy.486490
McAfee-GW-EditionBehavesLike.Win32.BadFile.nh
SophosTroj/Agent-BKGJ
IkarusTrojan.SuspectCRC
GDataGen:Variant.Zusy.486490
WebrootW32.Trojan.Gen
AviraTR/Agent.kxqdc
Antiy-AVLTrojan/Win32.Wacatac
ArcabitTrojan.Zusy.D76C5A
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Malware/Win.MalOb.C5474948
VBA32BScope.Trojan.Click
ALYacGen:Variant.Zusy.486490
MAXmalware (ai score=87)
MalwarebytesRiskWare.Agent
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002H0CI423
RisingTrojan.Agent!8.B1E (TFE:5:uERP8wpw5ZU)
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.216093304.susgen
FortinetW32/Rozena.BEF!tr
AVGWin32:MalOb-IJ [Cryp]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Zusy.486490?

Zusy.486490 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment