Home / Spyware Encyclopedia / Trojan.lazy.226474 << Back

Recommendation to Automatically remove Trojan.lazy.226474


Our products can remove Trojan.lazy.226474 and thousands of other Virus and Spyware automatically and instantly.

Trojan.lazy.226474 Details


  • Category Trojan
  • Discovered 10/24/2024 11:25:55 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d7a4cdde8df83a1a6d2d4c12422f73e821ec86f8.bin.exe 2093672  ae57ba4f2915900a2f0a8033428f44ff27/09/2022
77e6e8e9426bd516cf6dee02b0b421df43df79dc.bin.exe 2093672  729fb636e35a9d8099d6321c9c4a572a29/09/2022
d805c15ea45c6b43644cc2869719f97b.exe 574056  d805c15ea45c6b43644cc2869719f97b13/10/2022
ec5a759a73d043c17a04a1f8a771bc3b84d19c19cada4323c43b9fb96f010124.mrg.exe 1045096  204323a5298579dd65694e286bdd834301/11/2023
d250c0e9723baa1e497dd552aac1f63d6cf4c0741e272b7d4825db6867e48f43.mrg.exe 1045096  7b8cf2caba749e9eb2aa4dd78d1328e502/11/2023
be845dd009beaac563d288a045fb4febfb525d6080881a755c6be9622bf567c2.mrg.exe 1385064  c891958b91df7b11208a1894ced72eaa06/11/2023
bc49963c809757f9172fe9824ab383415859c0402acdf0acbac243dc22d5ab14.mrg.exe 3756648  7236f468ede97add496ea72e31c6e57108/11/2023
ee0b62fd659023f304b8c8f9a4340543bb47450330d485ac6553e3336fa4fa07.mrg.exe 1016424  8e3511c11063e43189c466cf44f3dd3708/11/2023
eaee2a2e7643b80c4703e186c56d1fac93f1ccbd7246398281f82095c2659bb7.mrg.exe 1262184  bc015a07f46dac1b699f4e10cce9a4ab21/11/2023
38bb71db9fe2eddd2fc70c20338336ab01356e066e5be18ebc3da715e7db93c4.mrg.exe 201320  61a8f4110291faf849ea0a333f0e947b29/11/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware