Worm

Worm:Win32/Tufik!pz removal instruction

Malware Removal

The Worm:Win32/Tufik!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm:Win32/Tufik!pz virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Binary compilation timestomping detected

How to determine Worm:Win32/Tufik!pz?


File Info:

name: BA5E9D4CF571480FDBE7.mlw
path: /opt/CAPEv2/storage/binaries/323ffe5f9c26e5dfede3189a7775bdc08f1b1fd8b9a6ad6daff8d86b1c9c198e
crc32: A8DE7936
md5: ba5e9d4cf571480fdbe76c36faed1bb8
sha1: 44ecac5fc0633b4939034084d794852ce106d13b
sha256: 323ffe5f9c26e5dfede3189a7775bdc08f1b1fd8b9a6ad6daff8d86b1c9c198e
sha512: a1a0f28553c33d64e057c2bc7b9a78163b945b2d273df5178db4e871b96c6bcb6d38e756972ed678fb6405687de41457da296b6e9149fcaa19546c167b422bb0
ssdeep: 24576:2LgV83LzXYJLKSMech6ispJzc5YYmsRr6ylMwpbdgaocZcv:2LgVLKRWTQ6Zs5DhgP9v
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19225AF13A7D60071F6B23530466FB7756DBE77210A78898D43940A7E5E32E80AF2936F
sha3_384: 5eb2424283718cebcbf6e50fca08a0f3e129da00289fd68504f6825644074a36284b502250e926132414c7c87c538f78
ep_bytes: e8000000005b81ebf2084000ff3424e8
timestamp: 2085-09-09 11:34:57

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Memory Diagnostic
FileVersion: 10.0.19041.1 (WinBuild.160101.0800)
InternalName: memdiag.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: memdiag.exe
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.19041.1
Translation: 0x0409 0x04b0

Worm:Win32/Tufik!pz also known as:

MicroWorld-eScanGeneric.Servstart.E.E170A49E
CAT-QuickHealW32.Tufik.gen
SkyhighBehavesLike.Win32.Worm.fh
McAfeeW32/Nitol.a
ZillyaDropper.Dinwod.Win32.19905
SangforSuspicious.Win32.Save.ins
K7AntiVirusVirus ( 004c1ed51 )
K7GWVirus ( 004c1ed51 )
VirITWin32.Tufik.A
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32Win32/Tufik.NAA
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Staser-9938521-0
KasperskyTrojan-Dropper.Win32.Dinwod.rsj
BitDefenderGeneric.Servstart.E.E170A49E
NANO-AntivirusTrojan.Win32.Crypted.ezgxcy
AvastWin32:Tufik
TencentVirus.Win32.Tufik.aab
EmsisoftGeneric.Servstart.E.E170A49E (B)
F-SecureTrojan.TR/Spy.Agent.muymz
DrWebTrojan.DownLoader.4268
VIPREGeneric.Servstart.E.E170A49E
TrendMicroWORM_NITOL.SMB0
SophosTroj/Agent-AZZH
SentinelOneStatic AI – Malicious PE
JiangminTrojanDropper.Dinwod.bqs
AviraTR/Spy.Agent.muymz
Antiy-AVLTrojan/Win32.Unknown
MicrosoftWorm:Win32/Tufik!pz
XcitiumVirus.Win32.Tufik.NAA1@1lq7yb
ArcabitGeneric.Servstart.E.E170A49E
ZoneAlarmTrojan-Dropper.Win32.Dinwod.rsj
GDataGeneric.Servstart.E.E170A49E
VaristW32/S-4ec753d4!Eldorado
AhnLab-V3Dropper/Win.Dinwod.R439035
BitDefenderThetaAI:Packer.39CF44811F
ALYacGeneric.Servstart.E.E170A49E
TACHYONVirus/W32.Dinwod
VBA32TrojanDownloader.Tiggre
Cylanceunsafe
TrendMicro-HouseCallWORM_NITOL.SMB0
RisingBackdoor.ServStart!1.B58A (CLASSIC)
YandexWin32.Perez.B
IkarusVirus.Win32.Tufik
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Tufik.AS
AVGWin32:Tufik
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Worm:Win32/Tufik!pz?

Worm:Win32/Tufik!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment