Categories: TrojanWorm

Trojan.P2P-Worm.cmIfau!Mfvh removal tips

The Trojan.P2P-Worm.cmIfau!Mfvh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.P2P-Worm.cmIfau!Mfvh virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan.P2P-Worm.cmIfau!Mfvh?


File Info:

name: 4AF769EAEFD50F1E5893.mlwpath: /opt/CAPEv2/storage/binaries/cbb180b3d9858b2bd4643b44bf97c27e7fd21c9d890ac08a31dd20c0b92f4eb2crc32: ACC7BAEDmd5: 4af769eaefd50f1e5893197efb4ee97fsha1: cbe4b3fde41c6af5a7bddcc8932555076655c183sha256: cbb180b3d9858b2bd4643b44bf97c27e7fd21c9d890ac08a31dd20c0b92f4eb2sha512: ba101ff1d252e96b74f2e0564f4c4ce7a6d0f557bdff8d63c0874692ee2de99247fdb6e6980dcbaf8caa4bf2fad8daacba3db1cf2cb18e63c1b68fc4addbd7edssdeep: 768:fllPp7JeTe5MLjH4B5NCPd7m+Z7hE6XmPAs6oj10Kv7:flEK5SYB5s1Zm6X6Lj10KDtype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T1D313F142096347E9CAA36BB1FD17490D40C9B8A146FC9722AB634411EEF477C98F8E36sha3_384: 2900559bd1f7995d05247fc280fdf0ad80a7b7ad43fb90e49a2de49f64bb732e8da59b654e07a92f0be494e4ce15ded9ep_bytes: 60be002041008dbe00f0feff5783cdfftimestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Trojan.P2P-Worm.cmIfau!Mfvh also known as:

Bkav W32.AIDetectMalware
AVG Win32:Sytro-AD [Wrm]
MicroWorld-eScan Gen:Trojan.P2P-Worm.cmIfau!Mfvh
FireEye Generic.mg.4af769eaefd50f1e
CAT-QuickHeal W32.Desfiro.MUE.A8
Skyhigh BehavesLike.Win32.Sytro.pc
McAfee W32/Sytro.worm.gen!p2p
Malwarebytes Generic.Malware.AI.DDS
Zillya Worm.Sytro.Win32.22
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 00540e8a1 )
K7GW Trojan ( 00540e8a1 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta AI:Packer.C1B86C2021
VirIT Worm.Win32.Soltern.AC
Symantec ML.Attribute.HighConfidence
Elastic malicious (moderate confidence)
ESET-NOD32 Win32/Soltern.N
Cynet Malicious (score: 100)
APEX Malicious
ClamAV Win.Worm.Sytro-6840421-0
Kaspersky P2P-Worm.Win32.Sytro.l
BitDefender Gen:Trojan.P2P-Worm.cmIfau!Mfvh
NANO-Antivirus Trojan.Win32.Sytro.fybz
Avast Win32:Sytro-AD [Wrm]
Tencent P2P-Worm.Win32.Sytro.zb
Sophos W32/Systro-L
Baidu Win32.Trojan.Agent.aaw
F-Secure Worm.WORM/Systro.I
DrWeb Win32.HLLW.Sytro.31
VIPRE Gen:Trojan.P2P-Worm.cmIfau!Mfvh
TrendMicro WORM_SYTRO.L
Trapmine malicious.moderate.ml.score
Emsisoft Gen:Trojan.P2P-Worm.cmIfau!Mfvh (B)
SentinelOne Static AI – Malicious PE
Jiangmin Worm/P2P.Sytro.l
Varist W32/Sytro.KUUM-5074
Avira WORM/Systro.I
MAX malware (ai score=88)
Antiy-AVL Worm[P2P]/Win32.Sytro
Kingsoft malware.kb.b.791
Microsoft Worm:Win32/Soltern!pz
Xcitium Worm.Win32.Soltern.N@3uzl
Arcabit Trojan.P2P-Worm.cmIfau!Mfvh
ViRobot Worm.Win32.P2P-Sytro.32768
ZoneAlarm P2P-Worm.Win32.Sytro.l
GData Win32.Trojan.PSE.14IXRBR
Google Detected
AhnLab-V3 Worm/Win32.Sytro.C314843
Acronis suspicious
VBA32 BScope.TrojanDropper.Delf
ALYac Gen:Trojan.P2P-Worm.cmIfau!Mfvh
TACHYON Worm/W32.DP-Sytro.Zen
Cylance unsafe
Panda Trj/CI.A
TrendMicro-HouseCall WORM_SYTRO.L
Rising Worm.P2p.Sytro.l (CLASSIC)
Ikarus Virus.Win32.Sytro
Fortinet W32/Delf.E867!tr
DeepInstinct MALICIOUS

How to remove Trojan.P2P-Worm.cmIfau!Mfvh?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago