Malware

Lazy.414556 removal guide

Malware Removal

The Lazy.414556 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.414556 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Creates a copy of itself
  • Deletes executed files from disk
  • Collects information to fingerprint the system
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.414556?


File Info:

name: 9B7AC6CDF3ED9E51E70B.mlw
path: /opt/CAPEv2/storage/binaries/5bc092530652a294fd16e93b726d22a0cda34c142b775e2eb6e698b1be004952
crc32: 3B66A0B5
md5: 9b7ac6cdf3ed9e51e70ba8ed08d7c587
sha1: cd0ce343179bdc8e0870413cfd200d644548339c
sha256: 5bc092530652a294fd16e93b726d22a0cda34c142b775e2eb6e698b1be004952
sha512: f434f75bddf330f3b7b728ec27799619eb32b28f7bb1e80eead79549b1c2569f59b6aef6738657814b6849a4b8e124c4f5a15b3b420a4adc8b883a8db8b7c3bf
ssdeep: 12288:USAJi5Vpu3EqLJVokLbUm4oI7nmADoiSHK/u8B4Uv:USAM5buUqL0MIjvDo7K/u8B4Uv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T114B4121F7685237BC29203B61F4CE4EAEB1DA07C53EE90A06465456C1177E78C3BDB8A
sha3_384: 0acfa5ee5ea1f6147256171f63e0f1553184f2007f71290b3be20c5d596976c382eb70c8f21e91a5ffe9c6f39f7d2558
ep_bytes: 60beeb4b3b0329f089c081c67f13b735
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Lazy.414556 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.414556
FireEyeGeneric.mg.9b7ac6cdf3ed9e51
SkyhighBehavesLike.Win32.Generic.hm
ALYacGen:Variant.Lazy.414556
MalwarebytesTrojan.MalPack.UPX
VIPREGen:Variant.Lazy.414556
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0057984e1 )
BitDefenderGen:Variant.Lazy.414556
K7GWTrojan ( 0057984e1 )
BitDefenderThetaGen:NN.ZexaF.36792.GmZ@au7DkUl
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Injector.EBQH
APEXMalicious
ClamAVWin.Packed.Copak-10010066-0
KasperskyHEUR:Trojan.Win32.Generic
RisingTrojan.Injector!1.C865 (CLASSIC)
SophosTroj/Agent-BGQS
TrendMicroPAK_Xed-10
EmsisoftGen:Variant.Lazy.414556 (B)
IkarusTrojan.Win32.Injector
MAXmalware (ai score=89)
GoogleDetected
VaristW32/Kryptik.DND.gen!Eldorado
Kingsoftmalware.kb.b.878
MicrosoftTrojan:Win32/Wacatac.B!ml
XcitiumPacked.Win32.MUPX.Gen@24tbus
ArcabitTrojan.Lazy.D6535C
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin32.Trojan.PSE.855VXQ
CynetMalicious (score: 100)
AhnLab-V3Malware/Gen.RL_Reputation.R368477
McAfeeGenericRXAA-FA!9B7AC6CDF3ED
DeepInstinctMALICIOUS
VBA32BScope.Trojan.Wacatac
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallPAK_Xed-10
TencentTrojan.Win32.Injector.wc
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agent.BGQS!tr
AVGWin32:Evo-gen [Trj]
AvastWin32:Evo-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.414556?

Lazy.414556 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment