Malware

Lazy.318621 removal tips

Malware Removal

The Lazy.318621 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.318621 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Creates a copy of itself
  • Deletes executed files from disk
  • Anomalous binary characteristics
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.318621?


File Info:

name: 9D12BC80B546B98EDBA8.mlw
path: /opt/CAPEv2/storage/binaries/2eeb25ff09c7924bac44f1796e84a9b208b2f70c74b72de0def8a4c6253f7722
crc32: 1EAADD7B
md5: 9d12bc80b546b98edba853846004c138
sha1: ec292ebbd502730edc4a235424aebe7c248605b6
sha256: 2eeb25ff09c7924bac44f1796e84a9b208b2f70c74b72de0def8a4c6253f7722
sha512: 65fbfc2bad74d6250adb0e01266342038fbe0575198c9084e0730a956f57855b5b5632255bf67638fbf9a5d586b9ed9c8fb07291a20f66e172e7c6a074db1969
ssdeep: 12288:EeWWZgewQkBplVW7pAJ0pwT5PTyHjlDa/ZSy:C7eEBplQdAJ0pi5PTy1a/ZSy
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18C15388937A244B3C489A676ED2FCA71451079F9A797C222F38C7A17F8F03B19086577
sha3_384: 90690ad91286ee6bd05d6ed99e80a36d04dffe861963c23fed1b670a5ad70ef7d97b0fd8036cfb5088ff8bbb34a3848d
ep_bytes: 43b3ba9913da3e1e163b378f94715f35
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Lazy.318621 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.318621
SkyhighBehavesLike.Win32.Trojan.cm
McAfeeTrojan-FVOQ!9D12BC80B546
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.318621
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005360b91 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GIFY
APEXMalicious
ClamAVWin.Packed.Dridex-9860931-1
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Lazy.318621
NANO-AntivirusTrojan.Win32.Kryptik.fhjvho
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.318621 (B)
GoogleDetected
F-SecureHeuristic.HEUR/AGEN.1369832
DrWebTrojan.PackedENT.169
ZillyaTrojan.Generic.Win32.890352
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.9d12bc80b546b98e
SophosMal/Inject-GJ
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.cqemj
VaristW32/Zusy.EM.gen!Eldorado
AviraHEUR/AGEN.1369832
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.991
MicrosoftTrojan:Win32/Glupteba.MT!MTB
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D4DC9D
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin32.Trojan.PSE.11XGYE9
CynetMalicious (score: 100)
AhnLab-V3Packed/Win.FJB.R564099
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36802.3SW@a0X5c5m
ALYacGen:Variant.Lazy.318621
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan-Downloader.Win32.FakeAlert
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
alibabacloudVirTool:Win/Kryptik.GIRH

How to remove Lazy.318621?

Lazy.318621 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment