Malware

How to remove “Zusy.488468”?

Malware Removal

The Zusy.488468 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.488468 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Zusy.488468?


File Info:

name: D0FF6553961216401EB8.mlw
path: /opt/CAPEv2/storage/binaries/d8d515cd5b6730660ad21d800bba7a49657eec1bedfa8cfe26ca9efd3cb8eeda
crc32: 35217A3F
md5: d0ff6553961216401eb83eb95cc6f363
sha1: d1ff83f78faee706aa358e7fa306434c132bf0f8
sha256: d8d515cd5b6730660ad21d800bba7a49657eec1bedfa8cfe26ca9efd3cb8eeda
sha512: cecafe66ffcbc76601f56eef17962321101710ea6ade805bca20bfb9359cd8ecd1229ab57f844a66c1b94d03f7f37d409c5d0b2961a2475e8213502c61982e36
ssdeep: 49152:xqbrc69K4Gz+4VeJpcTxKywl9L3f/jzvl5EGfD2LoAphH+kvEed:QrVK4G9VkpcTxxC9L33jzvI8qLoo8s
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DE26F111F5D78072C553473008AB6779F7B06F421F24CAE753A5EA2EBE322E19A36706
sha3_384: b2fdbedaaaa08b0ea40e8a106e88474dfae07552f213b865b7459edd54910888f0d74f6ea1045cf89c2071301394f4ce
ep_bytes: 558bec6aff6818c5850068b845480064
timestamp: 2023-08-14 09:34:32

Version Info:

FileVersion: 1.0.0.0
FileDescription: 易语言程序
ProductName: 易语言程序
ProductVersion: 1.0.0.0
LegalCopyright: 作者版权所有 请尊重并使用正版
Comments: 本程序使用易语言编写(http://www.eyuyan.com)
Translation: 0x0804 0x04b0

Zusy.488468 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.lIa2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.488468
SkyhighBehavesLike.Win32.Generic.rh
McAfeePUP-XEY-DN
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Zusy.488468
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 005246d51 )
AlibabaTrojan:Win32/MalwareX.02724697
K7GWUnwanted-Program ( 0056626f1 )
Cybereasonmalicious.78faee
ArcabitTrojan.Zusy.D77414
BitDefenderThetaGen:NN.ZexaF.36792.@t0@aOiyXYhb
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEXMalicious
CynetMalicious (score: 100)
BitDefenderGen:Variant.Zusy.488468
AvastWin32:MalwareX-gen [Trj]
EmsisoftApplication.Generic (A)
F-SecureHeuristic.HEUR/AGEN.1332184
TrendMicroTROJ_GEN.R002C0PHH23
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.d0ff655396121640
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Generic.aydcl
GoogleDetected
AviraHEUR/AGEN.1332184
MAXmalware (ai score=86)
Antiy-AVLTrojan/Win32.FlyStudio.a
XcitiumWorm.Win32.Dropper.RA@1qraug
MicrosoftTrojan:Win32/Hitbrovi!dha
GDataWin32.Trojan.PSE.15EXSUN
VaristW32/Trojan.GRW.gen!Eldorado
AhnLab-V3Malware/Win.AGEN.R605439
ALYacGen:Variant.Zusy.488468
Cylanceunsafe
TrendMicro-HouseCallTROJ_GEN.R002C0PHH23
RisingTrojan.Hitbrovi!8.2DCC (CLOUD)
IkarusTrojan.Win32.Agent
MaxSecureDropper.Dinwod.frindll
FortinetW32/CoinMiner.PHP!tr
AVGWin32:MalwareX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Zusy.488468?

Zusy.488468 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment