Home / Spyware Encyclopedia / Trojan.lazy.315515 << Back

Recommendation to Automatically remove Trojan.lazy.315515


Our products can remove Trojan.lazy.315515 and thousands of other Virus and Spyware automatically and instantly.

Trojan.lazy.315515 Details


  • Category Trojan
  • Discovered 3/24/2023 6:21:07 PM
  • Modified 3/27/2023 5:37:48 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
82ba264d647dfe5fad22c027b5adde59c7407d44.bin.exe 49152  0a5d7f89f7385a5d0c1c6b23a336c62b21/03/2023
8617a2d31e9b3695dfef225beed2d3132225800c.bin.exe 49152  712c8479797dfdd0d9d999b8f581993d21/03/2023
83c803130f21b9c35e9852b40d054d4b83c58310.bin.exe 49152  0a532e729c532bc7591e864705c2037222/03/2023
d3cb3c1c1dd9f510c127bc13656c302a6d203057ea696c37de7e780dfce33d4d.exe 49152  475d114665e3cf258d45ef519e15ea8b24/03/2023
8abf735d219ef9ceedc5f4841c5b60191ebc714cf87e09e21c81b415b8ce7474.exe 49152  31d82ab483be204676f230a77d1e10b524/03/2023
839163eb5345246fc1f1e0f5f01502f8a9ae110efca9a89643fd520552a6fd07.exe 49152  87202a29cf4b829b44f99348e735201e24/03/2023
39dbc2ed571970216e41cf77741cdaa90099e1ecfde766e2730ebc572e228182.exe 49152  fac97b05202cde6ac61c322833e77e0524/03/2023
01e954bfe5e8e73e1deb799c2d57e0b9da927126f8402abcbad1e53abab0acdf.exe 49152  1bb10b5c835776320fd4b77981b6fc2424/03/2023
f0fae9e10ccff45c9282da0eddf5c200.vir.exe 49152  f0fae9e10ccff45c9282da0eddf5c20024/03/2023
eafe8e0356e80b55d5f90c95415836c0.vir.exe 49152  eafe8e0356e80b55d5f90c95415836c024/03/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware