Malware

Lazy.414556 removal

Malware Removal

The Lazy.414556 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.414556 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.414556?


File Info:

name: 2197FC9C83EC21FB9B99.mlw
path: /opt/CAPEv2/storage/binaries/eb847dc15aab76ad17e82075d949bb610d00afe758611f7c621ebbd634b0bc68
crc32: 0F888736
md5: 2197fc9c83ec21fb9b9934df16bb4f94
sha1: 4f1a84ddf61c4acc3916fe4715ebc6481fd44868
sha256: eb847dc15aab76ad17e82075d949bb610d00afe758611f7c621ebbd634b0bc68
sha512: 7b1ccaffc30e8a3dc0266a1640af189dd3967703ad3d0c22019294bdc335260abdcf2e735b852521e2d2cb86b13adbbb33d2a13b2b7fe277c3a28f66174313d0
ssdeep: 49152:2Qsoe2NpTb8BJjUYxA8L49CdnAJRG4/8VHE/tVCy1PeU04:zFbNpPCJjUAAxCdnAJR9QHE/tVCy12F4
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1B785131AFA697B66CBE11271B5B312B1843C6FD652D44CC80EBC955C02535B4B2BFB0B
sha3_384: 4d8a3daadc95c123b88ad10f5e269d751069ec156e78e7375388769a3abb8d650a17a7d9c625ecb81afc3f90033d201d
ep_bytes: 60bed13c9222f7d009c289c261f7d0b8
timestamp: 1975-06-24 00:00:00

Version Info:

0: [No Data]

Lazy.414556 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.4!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.414556
FireEyeGeneric.mg.2197fc9c83ec21fb
SkyhighBehavesLike.Win32.Generic.tm
ALYacGen:Variant.Lazy.414556
Cylanceunsafe
ZillyaTrojan.GenKryptik.Win32.347641
SangforTrojan.Win32.Kryptik.Voxg
K7AntiVirusTrojan ( 0057da251 )
AlibabaTrojan:Win32/GenKryptik.8d6e5a49
K7GWTrojan ( 0057da251 )
ArcabitTrojan.Lazy.D6535C
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/GenKryptik.FGBK
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Lazy-10001745-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Lazy.414556
NANO-AntivirusTrojan.Win32.GenKryptik.keizqf
AvastWin32:Evo-gen [Trj]
TencentMalware.Win32.Gencirc.13f8768b
SophosMal/Generic-S
F-SecureHeuristic.HEUR/AGEN.1368481
DrWebTrojan.Siggen22.18036
VIPREGen:Variant.Lazy.414556
TrendMicroTROJ_GEN.R002C0WKS23
EmsisoftGen:Variant.Lazy.414556 (B)
SentinelOneStatic AI – Malicious PE
VaristW32/Kryptik.JIF.gen!Eldorado
AviraHEUR/AGEN.1368481
Antiy-AVLTrojan/Win32.GenKryptik
XcitiumMalCrypt.Indus!@1qrzi1
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin32.Trojan.PSE.YAQM86
GoogleDetected
AhnLab-V3Trojan/Win.Evo-gen.R565205
McAfeeArtemis!2197FC9C83EC
MAXmalware (ai score=84)
VBA32Trojan.Copak
MalwarebytesTrojan.MalPack.Generic
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0WKS23
RisingTrojan.Kryptik!1.D12D (CLASSIC)
YandexTrojan.Agent!z+Iy2JQtGXI
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.7164915.susgen
FortinetW32/GenKryptik.CRNJ!tr
BitDefenderThetaGen:NN.ZexaF.36608.OnY@aejDDIe
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Lazy.414556?

Lazy.414556 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment