Worm

Klez.Worm.FileInfector.DDS malicious file

Malware Removal

The Klez.Worm.FileInfector.DDS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Klez.Worm.FileInfector.DDS virus can do?

  • Sample contains Overlay data
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • CAPE detected the embedded pe malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Klez.Worm.FileInfector.DDS?


File Info:

name: F94B6C70718662532C43.mlw
path: /opt/CAPEv2/storage/binaries/2a30c696be908eccf8ea36bdb0fe1a425ef1070aeac543b96042e966ce67650e
crc32: CB78C575
md5: f94b6c70718662532c435d43dcad19af
sha1: ac459a9f835af85cfe58fa92816b82404540e7f4
sha256: 2a30c696be908eccf8ea36bdb0fe1a425ef1070aeac543b96042e966ce67650e
sha512: 6a1136c530059332bd88a0cf1e8027f5ba40f9f977dd4a97389accd454e6c7e8e91113eea1fc865f40e27a945759337396f37a33b2d5c5f6348773eff08d893b
ssdeep: 1536:zaWLF1kxTnUI4CFPtv6iSJnaGlbVxhoMJIu:zaWExTnUTCFPtvanaGlbVxhoJu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BC839E33B9908473C496823012AA5B155EFFE8320796D6C3F71D9A1B7F206D1EA3974B
sha3_384: b814e1b8cbd0db360d4a2201b0d05a2b186390952349b3b9fae3b0f094a8b5c5f19f22e4fd2ea3789f33412f3d45842e
ep_bytes: 558bec6aff6838d240006874a8400064
timestamp: 2002-01-18 01:22:13

Version Info:

0: [No Data]

Klez.Worm.FileInfector.DDS also known as:

BkavW32.AIDetectMalware
AVGWin32:Klez-E [Wrm]
Elasticmalicious (high confidence)
MicroWorld-eScanDropped:Win32.Elkern.B
CAT-QuickHealW32.Klez.H
SkyhighBehavesLike.Win32.Klez.mh
McAfeeW32/Klez.f@MM
MalwarebytesKlez.Worm.FileInfector.DDS
VIPREDropped:Win32.Elkern.B
SangforSuspicious.Win32.Save.ins
K7AntiVirusEmailWorm ( 000805561 )
K7GWEmailWorm ( 000805561 )
Cybereasonmalicious.071866
BaiduWin32.Worm.Klez.a
VirITWorm.Win32.Klez.J
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Klez
CynetMalicious (score: 100)
APEXMalicious
AvastWin32:Klez-E [Wrm]
ClamAVWin.Worm.Klez-2
KasperskyEmail-Worm.Win32.Klez.j
BitDefenderDropped:Win32.Elkern.B
NANO-AntivirusTrojan.Win32.Klez.fwaj
SUPERAntiSpywareWorm.Klez
SophosW32/Klez-Fam
F-SecureWorm.WORM/Klez.E
DrWebWin32.HLLM.Klez.6
ZillyaWorm.Klez.Win32.4
TrendMicroWORM_KLEZ.GEN
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.f94b6c7071866253
EmsisoftDropped:Win32.Elkern.B (B)
IkarusEmail-Worm.Win32.Klez.J
JiangminI-Worm/Klez.h
WebrootW32.Klez.Gen
VaristW32/Klez.J@mm
AviraWORM/Klez.E
MAXmalware (ai score=82)
Antiy-AVLWorm[Email]/Win32.Klez
MicrosoftWorm:Win32/Klez.G@mm
XcitiumTrojWare.Win32.Trojan.Agent.Gen@67u02
ArcabitWin32.Elkern.B
ViRobotI-Worm.Win32.Klez-gen
ZoneAlarmEmail-Worm.Win32.Klez.j
GDataWin32.Trojan.PSE.11SQ9WV
GoogleDetected
AhnLab-V3Win32/Klez.worm.I
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36802.fqY@aa5cMjd
ALYacDropped:Win32.Elkern.B
VBA32BScope.Trojan.Meredrop
Cylanceunsafe
PandaW32/Klez.H
TrendMicro-HouseCallWORM_KLEZ.GEN
RisingWorm.Klez!1.A1CB (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureWorm.W32.Klez.h
FortinetW32/Klez.fam@mm
ZonerWorm.Win32.Klez.27775
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)
alibabacloudWorm:Win/Klez.3431e10f

How to remove Klez.Worm.FileInfector.DDS?

Klez.Worm.FileInfector.DDS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment