Malware

Lazy.116177 (B) removal instruction

Malware Removal

The Lazy.116177 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.116177 (B) virus can do?

  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Binary compilation timestomping detected

How to determine Lazy.116177 (B)?


File Info:

name: 78D2E320FCBF93AF2AC7.mlw
path: /opt/CAPEv2/storage/binaries/7e1624df0ec310b2766bd7a9a98f05ef1ed576f0f7e0699aee3ecc35ddb03c12
crc32: 59A07378
md5: 78d2e320fcbf93af2ac712d37be34338
sha1: 6cf6a99cea366fab81b6ca4ed0a9bd0ffd1fbe8f
sha256: 7e1624df0ec310b2766bd7a9a98f05ef1ed576f0f7e0699aee3ecc35ddb03c12
sha512: e76da5fc80fe2b1b91c8201e4a2a05a9df138aa0c9a75e1b69bb2ce10bf546720cd6a91da981ff04a647462d122082bed04ca56ce54ae6fb1fbdf0c4b16f88b3
ssdeep: 1536:cQGa+erDLKGTkSdg5i498DYwz1gvUEoDgakcGSqDsecmUMdpNRQXr6tiz:cQOmHKR8DHz1KloDjpUhcspzQXr6Yz
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E3737B4573932761C2A954B1C1E7452507F2E78B3633D78E3E8C16CA1F237E58E8AB98
sha3_384: 99586aafc4e1330b33e9aa2ceedad1e1ac14f3a2ec57267248edad432dee0242c0aa0c39c6edce5395ea159e9f596be7
ep_bytes: ff250020400000000000000000000000
timestamp: 2092-11-24 15:50:35

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription: Software inc.
FileVersion: 1.0.0.0
InternalName: LoaderFor@Aureliun_v2.exe
LegalCopyright: Copyright © 2022
LegalTrademarks:
OriginalFilename: LoaderFor@Aureliun_v2.exe
ProductName: Bested sellers
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Lazy.116177 (B) also known as:

LionicTrojan.MSIL.Stealer.l!c
CynetMalicious (score: 100)
FireEyeGeneric.mg.78d2e320fcbf93af
McAfeeGenericRXRS-SI!78D2E320FCBF
CylanceUnsafe
SangforTrojan.MSIL.Stealer.gen
K7AntiVirusTrojan-Downloader ( 0058e35f1 )
K7GWTrojan-Downloader ( 0058e35f1 )
CyrenW32/Trojan.WEMM-9241
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/TrojanDownloader.Agent.KJJ
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefenderGen:Variant.Lazy.116177
MicroWorld-eScanGen:Variant.Lazy.116177
AvastWin32:SpywareX-gen [Trj]
Ad-AwareGen:Variant.Lazy.116177
EmsisoftGen:Variant.Lazy.116177 (B)
ComodoMalware@#1vfhkna46xdkw
DrWebTrojan.Siggen16.40868
TrendMicroTROJ_FRS.0NA103B922
McAfee-GW-EditionArtemis!Trojan
SophosMal/Generic-S
IkarusTrojan-Downloader.MSIL.Agent
GDataGen:Variant.Lazy.116177
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1203885
KingsoftWin32.Troj.Undef.(kcloud)
GridinsoftRansom.Win32.Sabsik.sa
ArcabitTrojan.Lazy.D1C5D1
ZoneAlarmHEUR:Trojan-Spy.MSIL.Stealer.gen
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3Trojan/Win.Generic.C4960434
BitDefenderThetaGen:NN.ZemsilF.34212.em0@aC1b@sl
ALYacGen:Variant.Lazy.116177
MAXmalware (ai score=88)
VBA32TScope.Trojan.MSIL
MalwarebytesTrojan.Downloader.Discord
TrendMicro-HouseCallTROJ_FRS.0NA103B922
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:UMqQ0kl8LKEqThwsEVjbLA)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetPossibleThreat
AVGWin32:SpywareX-gen [Trj]
PandaTrj/GdSda.A

How to remove Lazy.116177 (B)?

Lazy.116177 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment