Worm

About “Worm.DelfPMF.S30896276” infection

Malware Removal

The Worm.DelfPMF.S30896276 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.DelfPMF.S30896276 virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Worm.DelfPMF.S30896276?


File Info:

name: 7197BE45582D1379520D.mlw
path: /opt/CAPEv2/storage/binaries/813c43383e372fd46e713057f3a467a2733c3d6f487df1b9eaab83d2b90fdbed
crc32: B0C11014
md5: 7197be45582d1379520d5c81a812d3c9
sha1: dae7cd85f15af9eede4f97a21fc380adfb03b08b
sha256: 813c43383e372fd46e713057f3a467a2733c3d6f487df1b9eaab83d2b90fdbed
sha512: 2b585e32e735ae8539a623e54a5d588e75a125a774ece048d13b0b69b457b98c37c60fb45d1f93a43d227149251a91918cea8f9af457b7894f52fdf3c8a01436
ssdeep: 12288:hlEMrWcRGJlFWce6EbNidvL/JM7aIrVQrE1SpYQqLWpc0qpb0qD0xcu:N6cMJl/uIlMnUE1SpYJLMq2qDFu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T141A5A787F603E94BE3C5E8348825DA72526237BD97F349B9BC6CB5D8F62A1533414E02
sha3_384: 3c3eb24ab512a418605774ad35ab92cd1eebde5456440515620dbf56a9312eb5ff3984749eecbdcc23d7bd91bdd2d12d
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Worm.DelfPMF.S30896276 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (moderate confidence)
MicroWorld-eScanTrojan.Agent.EICV
ClamAVWin.Malware.Delf-6737076-0
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.HLLP.vm
McAfeeW32/HLLP.11042.gen
Cylanceunsafe
VIPRETrojan.Agent.EICV
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.5f15af
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
tehtrisGeneric.Malware
ESET-NOD32Win32/Delf.NAY
APEXMalicious
CynetMalicious (score: 100)
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
EmsisoftTrojan.Agent.EICV (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
ZillyaWorm.Delf.Win32.3450
TrendMicroTROJ_AGENT_005911.TOMB
SophosW32/BagarBu-A
IkarusWorm.Win32.Eggnog
JiangminWorm/Delf.vm
WebrootW32.Worm.Gen
GoogleDetected
AviraTR/Dropper.Gen
Antiy-AVLVirus/Win32.BagarBubba.a
Kingsoftmalware.kb.b.1000
MicrosoftWorm:Win32/Xolxo.A
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
ArcabitTrojan.Agent.EICV
ZoneAlarmP2P-Worm.Win32.Delf.aj
GDataTrojan.Agent.EICV
VaristW32/Aple.A.gen!Eldorado
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.36680.eoZ@a0C2bxn
MAXmalware (ai score=81)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
YandexTrojan.GenAsa!HYSjiRN/8Mk
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Worm.DelfPMF.S30896276?

Worm.DelfPMF.S30896276 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment