Worm

Should I remove “P2P-Worm.Win32.Palevo.hsfb”?

Malware Removal

The P2P-Worm.Win32.Palevo.hsfb is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What P2P-Worm.Win32.Palevo.hsfb virus can do?

  • Attempts to connect to a dead IP:Port (1 unique times)
  • Drops a binary and executes it
  • Installs itself for autorun at Windows startup
  • Likely virus infection of existing system binary
  • Creates a copy of itself
  • Attempts to disable UAC
  • Attempts to modify or disable Security Center warnings
  • Attempts to modify UAC prompt behavior

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine P2P-Worm.Win32.Palevo.hsfb?


File Info:

crc32: 0E657071
md5: 16dddc13f387b63530555665021be31e
name: dnx.exe
sha1: 378e399cd1b0e8f15f8e891387be782e6cf01c67
sha256: 57e3744a334a41c72da8b33a11d134bf5004cbb75409e6e4e43ffa9cdd5ec52d
sha512: bacd98eb9a43edd8515402ac4f6135790a5caaf49de89685dd1b5d30f03a7cc79895f40d7e9c347f74ee840a9b7d74a1c52cd91bcbbbfaedcd388e85109530cc
ssdeep: 1536:ia0dkJcE9FWrsyZK4aUkJ+sMpQCrIULTRN9EQQ5gci1fnGaBsWjcdpvJ+qHf7Ui:x0+HAaUO1C9dNaph+EUidlq3WWDSh
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

P2P-Worm.Win32.Palevo.hsfb also known as:

BkavW32.VariantPalevoB.Trojan
MicroWorld-eScanTrojan.GenericKD.41459369
VBA32BScope.Trojan.Pynamer
FireEyeGeneric.mg.16dddc13f387b635
CAT-QuickHealTrojan.Mauvaise.SL1
ALYacTrojan.GenericKD.41459369
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
K7AntiVirusDoS-Trojan ( 004c87db1 )
BitDefenderTrojan.GenericKD.41459369
K7GWDoS-Trojan ( 004c87db1 )
Cybereasonmalicious.3f387b
TrendMicroTROJ_FUSHIELD.SM
BaiduWin32.Trojan.Agent.asz
F-ProtW32/Worm.BLRV
SymantecSMG.Heur!gen
APEXMalicious
AvastWin32:Malware-gen
GDataTrojan.GenericKD.41459369
KasperskyP2P-Worm.Win32.Palevo.hsfb
AlibabaWorm:Win32/Palevo.222a361c
NANO-AntivirusTrojan.Win32.Palevo.eedpnj
ViRobotTrojan.Win32.Z.Palevo.148992.DV
AegisLabWorm.Win32.Palevo.tnDr
RisingWorm.Palevo!8.171 (TFE:dGZlOgWrGPYkYD4H7A)
Endgamemalicious (high confidence)
SophosTroj/Mdrop-IIF
ComodoTrojWare.Win32.Palevo.AA@5szlv3
F-SecureHeuristic.HEUR/AGEN.1022291
DrWebTrojan.DownLoader24.60205
ZillyaWorm.Palevo.Win32.115038
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Dropper.ch
MaxSecureTrojan.Malware.8559262.susgen
Trapminemalicious.high.ml.score
EmsisoftTrojan.GenericKD.41459369 (B)
IkarusP2P-Worm.Win32.Palevo
CyrenW32/Worm.AZTL-2353
JiangminTrojan/Generic.bgtwn
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1022291
MAXmalware (ai score=86)
MicrosoftTrojan:Win32/Fushield.A!bit
ArcabitTrojan.Generic.D2789EA9
SUPERAntiSpywareTrojan.Agent/Gen-Malagent
ZoneAlarmP2P-Worm.Win32.Palevo.hsfb
AhnLab-V3Trojan/Win32.Dynamer.R159816
Acronissuspicious
McAfeeGenericRXFQ-JP!16DDDC13F387
TACHYONWorm/W32.Palevo.148992.CT
Ad-AwareTrojan.GenericKD.41459369
MalwarebytesTrojan.Agent
PandaTrj/Genetic.gen
ESET-NOD32Win32/DDoS.Agent.NBL
TrendMicro-HouseCallTROJ_FUSHIELD.SM
TencentMalware.Win32.Gencirc.10b3aab1
YandexWorm.P2P.Palevo!sDwUZaGMw7k
SentinelOneDFI – Suspicious PE
eGambitTrojan.Generic
FortinetW32/Agent.NBI!tr
BitDefenderThetaGen:NN.ZexaF.34106.juW@a01N9bei
AVGWin32:Malware-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)
Qihoo-360Win32/Backdoor.Androm.K

How to remove P2P-Worm.Win32.Palevo.hsfb?

P2P-Worm.Win32.Palevo.hsfb removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment