Malware

Lazy.422236 information

Malware Removal

The Lazy.422236 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.422236 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Lazy.422236?


File Info:

name: B51144905C8A74F187EB.mlw
path: /opt/CAPEv2/storage/binaries/09d5acd31572c8650621f016784dcd4f8324b6437d02916f7cbc818f2e963349
crc32: FAB03F31
md5: b51144905c8a74f187eb8ec640732746
sha1: 339ba3b6fada67ced0f11dfc67eb8c5716e4982b
sha256: 09d5acd31572c8650621f016784dcd4f8324b6437d02916f7cbc818f2e963349
sha512: a129e7e40695c3602be5481b9b786e545dd80b8e078b24f207fc173cd8bf2e5e305c3a2c9d90869c89250200a4115ca06b6dbd7daa906e1d81379bb97b4db888
ssdeep: 3072:qfbA7uidA7AyemWvik8STpUpbQT7+CcfIyZ+cc9tHKQrwkMnFoMua0O:Hdw3Wi2T2tEPEZsvHGkMFofLO
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T185549D1676818272D2A3027226F8CBB3A63DBD320B7699CBB3D44B5C1770AD19735793
sha3_384: fbdd5dfff27126d154e92c7c488bb195dcc15d6334bea199fdbaa09d4b39f7e995a78c0cb1e04d35631aeb2d5834252e
ep_bytes: e820a00000e9000000006a1468a8bf42
timestamp: 2016-03-26 21:22:15

Version Info:

0: [No Data]

Lazy.422236 also known as:

BkavW32.Common.6B96C617
MicroWorld-eScanGen:Variant.Lazy.422236
ClamAVWin.Malware.Padodor-10013598-0
SkyhighBehavesLike.Win32.SFXMplug.dm
ALYacGen:Variant.Lazy.422236
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Miner.Win32.506
SangforMiner.Win32.Zusy_34.se2
K7AntiVirusCryptoMiner ( 004a91c31 )
K7GWCryptoMiner ( 004a91c31 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.Lazy.D6715C
SymantecTrojan.Coinbitminer
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/CoinMiner.TY
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-Banker.Win32.CoinMiner.gen
BitDefenderGen:Variant.Lazy.422236
NANO-AntivirusTrojan.Win32.BitCoinMiner.diuqim
AvastWin32:SvcMiner-C [Trj]
TencentTrojan.Win32.CoinMiner.16000314
EmsisoftGen:Variant.Lazy.422236 (B)
F-SecureHeuristic.HEUR/AGEN.1314560
DrWebTrojan.DownLoad3.46638
VIPREGen:Variant.Lazy.422236
TrendMicroCoinminer_MALXMR.SMMR-WIN32
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.b51144905c8a74f1
SophosTroj/Miner-AFL
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Miner.cy
GoogleDetected
AviraHEUR/AGEN.1314560
MAXmalware (ai score=84)
Antiy-AVLTrojan/Win32.CoinMiner.ty
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.CoinMiner.TY@7fc9k5
MicrosoftTrojan:Win32/CoinMiner.RDE!MTB
ZoneAlarmHEUR:Trojan-Banker.Win32.CoinMiner.gen
GDataWin32.Trojan.PSE.13NY0C7
VaristW32/Coinminer.HV.gen!Eldorado
AhnLab-V3Trojan/Win.Agent.R420168
Acronissuspicious
McAfeeTrojan-FESQ!B51144905C8A
TACHYONTrojan/W32.CoinMiner.290951
VBA32Trojan.Download
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallCoinminer_MALXMR.SMMR-WIN32
RisingTrojan.CoinMiner!1.BC9C (CLASSIC)
YandexTrojan.CoinMiner!FFRIgj0wrus
IkarusTrojan.Win32.CoinMiner
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/CoinMiner.TY!tr
BitDefenderThetaGen:NN.ZexaF.36792.rSZ@aahUDDji
AVGWin32:SvcMiner-C [Trj]
Cybereasonmalicious.6fada6
DeepInstinctMALICIOUS

How to remove Lazy.422236?

Lazy.422236 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment