Home / Spyware Encyclopedia / Trojan.lazy.226474 << Back

Recommendation to Automatically remove Trojan.lazy.226474


Our products can remove Trojan.lazy.226474 and thousands of other Virus and Spyware automatically and instantly.

Trojan.lazy.226474 Details


  • Category Trojan
  • Discovered 10/24/2024 11:25:55 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
38bb71db9fe2eddd2fc70c20338336ab01356e066e5be18ebc3da715e7db93c4.mrg.exe 201320  61a8f4110291faf849ea0a333f0e947b29/11/2023
176d5029406e5bf3c2169ec749043df4f4ac549b.bin.exe 1045096  82c718ea576be6d42b420b9c9e3be56829/05/2024
6ca0c13137e73910918895ab5486d7d64dedd0a9.bin.exe 1045096  9d05b74d8b92992ecdd983490ce7295412/06/2024
0d4549f848a2d53f1d688ef2495bb298732eca4bf03e43b34af841988129ed80.mrg.exe 1045096  b45055679209c1469de361d0ed5b0c0308/08/2024
a972ce0e587d36a1a16b36eb229cb830a6afd22a.bin.exe 1045096  f8120da0af5e1db1c285f9a35ef16ca103/10/2024
8ef95d7549fc995ab3cec41d3dcec331fdbe46b54e269f68f41d01cbe2ba0918.mrg.exe 1045096  337e4b4301a0536fdc121c3e08bce4df15/10/2024
d266d593a311e6801f9fa80a1801b3c26c1347d7d55b6cf74ec061365af7fa2e.mrg.exe 1045096  b8d794b7207ba2b42caa5af1bcf65ebc15/10/2024
dcfed322afbc5780551c18ff05cc09fbad209c71eb6d6c6c493303397feb5310.mrg.exe 1045096  22ef8dad783edb839cf2193ab49a814215/10/2024
38b432634c3c19694a745919a59898d528b2044a3d69a994697d7a366251e054.mrg.exe 1045096  82955feab0918ab8cc8d0e4e9f3140ac15/10/2024
b62a42d19a559952936478c13a763b0868053ab1.bin.exe 1045096  926db3ef7ea20c9143644089e2f0b28f27/09/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware