Worm

How to remove “Worm:Win32/Mofksys!pz”?

Malware Removal

The Worm:Win32/Mofksys!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm:Win32/Mofksys!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Worm:Win32/Mofksys!pz?


File Info:

name: F0C4CA0E3AAEA64CFC36.mlw
path: /opt/CAPEv2/storage/binaries/558c2871ea0ce085e75f77253187636a37384f0440e772136349ebd8954260ee
crc32: 0408E8AA
md5: f0c4ca0e3aaea64cfc3668e268fc8ef4
sha1: 8ab702d69d90840d2ea7bd0115f769138876176a
sha256: 558c2871ea0ce085e75f77253187636a37384f0440e772136349ebd8954260ee
sha512: e17e935aabbef184949b6fae882e54e5a7d982c014a0092627285cc81c3b56abcf8501d860b3d4ab9c007f5c1e55ed0a555effb11a584abc8a1dd4f5ffc0fe06
ssdeep: 6144:XsLqdufVUNDaRQgJp16euK1G+xcJwHK4OZYbYcDQuH:cFUNDamsb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17B747036F7CBF08FC88740B1AA21B74D63655EAD0B5C5B0A2188B76D1B75A07F5602CB
sha3_384: 0d535d5f885cddca4ea0af5f69e73279856327979c15a3cd5bc0e73bdb7f689255258fc5ee000191f72b6a96a65066a5
ep_bytes: 68dc3a4000e8eeffffff000048000000
timestamp: 2013-04-01 07:08:22

Version Info:

Translation: 0x0409 0x04b0
ProductName: Project1
FileVersion: 1.00
ProductVersion: 1.00
InternalName: TJprojMain
OriginalFilename: TJprojMain.exe

Worm:Win32/Mofksys!pz also known as:

BkavW32.WatermarkHQc.PE
Elasticmalicious (high confidence)
DrWebWin32.HLLP.Swisyn
MicroWorld-eScanTrojan.GenericKD.41832313
ClamAVWin.Trojan.VBGeneric-6735875-0
FireEyeGeneric.mg.f0c4ca0e3aaea64c
CAT-QuickHealW32.Mofksys.A4
SkyhighBehavesLike.Win32.Swisyn.ft
McAfeeW32/Swisyn.b
MalwarebytesGeneric.Malware.AI.DDS
ZillyaVirus.HLLP.Win32.1
SangforTrojan.Win32.Save.a
K7AntiVirusVirus ( 00579e181 )
K7GWVirus ( 00579e181 )
Cybereasonmalicious.69d908
BitDefenderThetaAI:Packer.87F3C55720
VirITTrojan.Win32.Agent4.ALYU
SymantecW32.Gosys
ESET-NOD32Win32/VB.NBI
ZonerTrojan.Win32.88925
APEXMalicious
CynetMalicious (score: 100)
KasperskyVirus.Win32.VB.mz
BitDefenderTrojan.GenericKD.41832313
NANO-AntivirusTrojan.Win32.Swisyn.flhacn
AvastWin32:VB-OJQ [Wrm]
TencentWorm.Win32.Wbna.wf
EmsisoftTrojan.GenericKD.41832313 (B)
F-SecureTrojan.TR/Patched.Ren.Gen
BaiduWin32.Worm.VB.b
VIPRETrojan.GenericKD.41832313
TrendMicroPE_SWISB.A
SophosTroj/Agent-ABZF
IkarusWorm.Mofksys
GDataWin32.Trojan.PSE1.1NLNP9O
JiangminTrojan/Agent.hxgb
WebrootW32.Malware.Gen
GoogleDetected
AviraTR/Patched.Ren.Gen
MAXmalware (ai score=84)
Antiy-AVLTrojan/Win32.Agent
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.VB.QOTY@4qfd0g
ArcabitTrojan.Generic.D27E4F79
ZoneAlarmVirus.Win32.VB.mz
MicrosoftWorm:Win32/Mofksys!pz
VaristW32/Trojan.UEJO-9077
AhnLab-V3Trojan/Win32.RL_Agent.R264253
Acronissuspicious
VBA32TScope.Trojan.VB
ALYacTrojan.GenericKD.41832313
TACHYONWorm/W32.VB-Mofksys.Zen
Cylanceunsafe
PandaTrj/Spy.AT
TrendMicro-HouseCallPE_SWISB.A
RisingTrojan.Agent!1.6A70 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.Agent.xjgj
FortinetW32/VB.QCC!tr.dldr
AVGWin32:VB-OJQ [Wrm]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Worm:Win32/Mofksys!pz?

Worm:Win32/Mofksys!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment