Worm

Worm.DelfPMF.S30896276 removal instruction

Malware Removal

The Worm.DelfPMF.S30896276 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.DelfPMF.S30896276 virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Worm.DelfPMF.S30896276?


File Info:

name: F8C77A189B1D7CF796A4.mlw
path: /opt/CAPEv2/storage/binaries/76b9937c055e6c31fc1ce868eb7be94f5ef4bfc590ffd2781c918ffbc1fd08c8
crc32: 1A8D59C7
md5: f8c77a189b1d7cf796a44fcb21ec06cd
sha1: a55d474e16f712e2a26a3522373178015e27ea7e
sha256: 76b9937c055e6c31fc1ce868eb7be94f5ef4bfc590ffd2781c918ffbc1fd08c8
sha512: c5adfc6b1b86b94e2be2d24d2f2cfe81e5706106f5d42739abe6d908acec536a920f4534a654ded81a94692f41d5efc386fc1cbdb87509cb2b5cd2d282d85adf
ssdeep: 12288:hlEMrWcRGJlFINAfChI7YKTD6thgTxJMqF:N6cMJliNc7rFbMqF
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10A053A56B6A814D4E162633989A28645E7717CA91B2187CBEE74B31EEF3F2F05D3C301
sha3_384: 434a4fa5a61e3fd3aa6312caf74bb5de74e23145663fc888327449a3dcfa65084a2080169cf0e9c65313e511dfae840f
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Worm.DelfPMF.S30896276 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (moderate confidence)
MicroWorld-eScanTrojan.Agent.EICV
ClamAVWin.Malware.Cosmu-9943629-0
FireEyeGeneric.mg.f8c77a189b1d7cf7
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.HLLP.cm
McAfeeW32/HLLP.11042.gen
MalwarebytesGeneric.Malware.AI.DDS
ZillyaWorm.Delf.Win32.3450
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
K7GWTrojan ( 004bcce41 )
CrowdStrikewin/malicious_confidence_100% (W)
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
tehtrisGeneric.Malware
ESET-NOD32Win32/Delf.NAY
APEXMalicious
CynetMalicious (score: 100)
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
SophosW32/BagarBu-A
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
VIPRETrojan.Agent.EICV
TrendMicroTROJ_AGENT_005911.TOMB
EmsisoftTrojan.Agent.EICV (B)
IkarusTrojan.Agent
GDataTrojan.Agent.EICV
JiangminWorm/Delf.vm
WebrootW32.Worm.Gen
GoogleDetected
AviraTR/Dropper.Gen
Antiy-AVLVirus/Win32.BagarBubba.a
Kingsoftmalware.kb.b.999
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
ArcabitTrojan.Agent.EICV
ZoneAlarmP2P-Worm.Win32.Delf.aj
MicrosoftWorm:Win32/Xolxo.A
VaristW32/Aple.A.gen!Eldorado
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.36680.YmZ@a0C2bxn
ALYacTrojan.Agent.EICV
MAXmalware (ai score=82)
VBA32Worm.Delf
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
YandexTrojan.GenAsa!HYSjiRN/8Mk
SentinelOneStatic AI – Malicious PE
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
Cybereasonmalicious.e16f71
DeepInstinctMALICIOUS

How to remove Worm.DelfPMF.S30896276?

Worm.DelfPMF.S30896276 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment