Malware

Should I remove “Lazy.444966”?

Malware Removal

The Lazy.444966 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.444966 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.444966?


File Info:

name: 18CB4EA108521E05F340.mlw
path: /opt/CAPEv2/storage/binaries/56b26b4036941d972154d5866e4bc8fb5cc3ca9c8c8fb91b711466642c415641
crc32: B319B4B7
md5: 18cb4ea108521e05f34007ac8122e49f
sha1: 3cccc069707abccda5f114aaa60a91f9d465308d
sha256: 56b26b4036941d972154d5866e4bc8fb5cc3ca9c8c8fb91b711466642c415641
sha512: baa6758680c772693fc0f8c77e7d32606ce1edf54b0999f94d295903fae117ee9be5e7398626c8e4aa70fa8b59d947d5b4a8753fca3bcd68c6750e1cbf8462e8
ssdeep: 12288:Tf6ljtK9/A1hlAWdlVe91W1BUAn1Mo75Vbv59gfIJVgQyfu:TYj/1hlAWdlVe9YymVD59gfIJVgQyfu
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13FE4BF9E724B0BB1D5D41230A90B75CB63159224F2EF8198D468602C1E6EDEFE3BF617
sha3_384: ce501b9898b74c4bcd1a4afa16731cfe5b375c283c83da71eeb8b788ae50ba8f0d6c3c41ec0cab9608b97b0a92718122
ep_bytes: ccd0b10b9cb9358c99583c1d8b1a54a7
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.444966 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.444966
SkyhighBehavesLike.Win32.Glupteba.jc
McAfeeTrojan-FVOQ!18CB4EA10852
MalwarebytesGeneric.Malware.AI.DDS
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
ArcabitTrojan.Lazy.D6CA26
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik_AGen.BGU
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Dridex-9775371-1
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.444966
NANO-AntivirusTrojan.Win32.Kryptik.ffsaaa
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.Crypt.hce
EmsisoftGen:Variant.Lazy.444966 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.PackedENT.123
VIPREGen:Variant.Lazy.444966
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
JiangminTrojan.Generic.dujrj
VaristW32/Trojan.NJGF-3047
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmVHO:Trojan.Win32.Copak.gen
GDataGen:Variant.Lazy.444966
GoogleDetected
AhnLab-V3Packed/Win.FJB.C5394144
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.O8Z@a4B08Bk
ALYacGen:Variant.Lazy.444966
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Khalesi
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.444966?

Lazy.444966 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment