MediaGet, Potentially Superfluous Software.

5/5 - (1 votes)

.

MediaGet, Potentially Superfluous Software.

MediaGet is a PeerToPeer Bittorent download management software. It allows you to download many categories of files over the network.

It searches torrents, transforms content into different formats and organizes downloads. It can install Babylon adware (Adware). A large number of antiviruses detect MediaGet with varying levels as Adware, Riskware, PUP or even Trojan.


This program is classified as Potentially Unnecessary Software (LPS). It installs as a program and/or as a browser extension. It can start automatically from the Registry via a "Run" key, a service or a scheduled task. It may launch when you start your browser after changing its settings. Sometimes the launch is done silently, that is to say it works in the background. The virus analysis of this software does not show any malware detection.


These are mostly legitimate programs that may not be necessary for your system to function properly. The multiplication of programs launched at system startup can cause delays in the execution of ordinary system tasks but also when browsing the Internet. Note that some programs come from downloads with repackaging, a technique which consists of offering other software during installation. These additional programs are obviously superfluous, they can even be installed without your knowledge. It is recommended to read the EULA before installing packaged software. Before clicking, check the relevance of the pre-checked boxes offered to you.


Spyware (spyware) and adware (adwares) unwanted files, just like malware, can use the writing flaws of legitimate software or those of operating systems. It is therefore essential to have official software and that it has automatic updating. Likewise, your Windows operating system must be programmed in automatic update mode and activated, so that you can have the latest updates for critical security vulnerabilities.

  Features

– It installs as a process launched at system startup (RP),
– It is installed in the Registry Base in order to be launched each time the system is started (O4),
– It is installed as a program (O42),
– It creates “Software” registry keys,
– It creates a ShareTools MSconfig StartupReg registry key (O53),
– It creates an active inbound connection in Windows Firewall Application Exceptions (O87),
– It creates multiple files and folders (O88)
– It creates many registry keys and values ​​(O88),

Preview in reports

Recorded on 29/12/2011.
[MD5.021E8367C1EF29D584F67C936D6DA987] – (.MediaGet LLC – MediaGet torrent client.) — C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe [8111104] [PID.3652]
[MD5.1F4416D1F62941F88CE09FABCD82D6CB] – (.MediaGet LLC – MediaGet torrent client.) — C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe [8156392]
O4 – HKCU\..\Run: [MediaGet2] C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe
O4 – HKCU\..\Run: [MediaGet2] . (.MediaGet LLC – MediaGet torrent client.) — C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe
O4 – HKUS\S-1-5-21-1893953454-2912623631-3925221452-1000\..\Run: [MediaGet2] C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe
O42 – Software: MediaGet – (.Media Get LLC.) [HKCU] — MediaGet
O42 – Software: MediaGet2 version 2.1.780.0 – (.MediaGet LLC.) [HKLM] — {9193306E-5935-47E0-B458-2548778C1614}_is1
[HKCU\Software\Mediaget]
O43 – CFD: 29/12/2011 – 13:38:14 PM – [0] —-D- C:\Documents and Settings\Coolman\Local Settings\Application Data\Media Get LLC
O43 – CFD: 29/12/2011 – 13:38:14 PM – [0] —-D- C:\Documents and Settings\Coolman\Local Settings\Application Data\MediaGet2
O43 – CFD: 8/28/2011 – 10:11:44 AM – [0] —-D- C:\Users\Coolman\AppData\Local\MediaGet2
O43 – CFD: 24/11/2011 – 18:41:26 PM – [0,001] —-D- C:\ProgramData\Media Get LLC
O43 – CFD: 24/11/2011 – 18:41:26 PM – [0,003] —-D- C:\Users\Coolman\AppData\Roaming\Media Get LLC
O43 – CFD: 25/11/2011 – 19:28:56 PM – [9,007] —-D- C:\Users\Coolman\AppData\Local\Media Get LLC
O43 – CFD: 24/11/2011 – 18:41:24 PM – [33,745] —-D- C:\Users\Coolman\AppData\Local\MediaGet2
O53 – SMSR:HKLM\…\startupreg\MediaGet2 [Key] . (…) — C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe
O87 – FAEL: “TCP Query User{BB663833-6F12-44A1-A84F-E8F7EDDF9F3E}C:\users\Coolman\appdata\local\mediaget2\mediaget.exe” |In – Public – P6 – TRUE | .(…) — C:\users\Coolman\appdata\local\mediaget2\mediaget.exe
O87 – FAEL: “UDP Query User{5395E6F2-D256-4E0F-BB20-562ECF8D641A}C:\users\Coolman\appdata\local\mediaget2\mediaget.exe” |In – Public – P17 – TRUE | .(…) — C:\users\Coolman\appdata\local\mediaget2\mediaget.exe
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:MediaGet2
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet]
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{9193306E-5935-47E0-B458-2548778C1614}_is1]
[HKCU\Software\Mediaget]
C:\Users\Thierry\AppData\Roaming\Media Get LLC
C:\Documents and Settings\Coolman\Local Settings\Application Data\Media Get LLC
C:\Documents and Settings\Coolman\Local Settings\Application Data\MediaGet2
C:\Users\Coolman\AppData\Local\Media Get LLC
C:\Users\Coolman\AppData\Local\MediaGet2
C:\ProgramData\Media Get LLC
C:\Users\Coolman\AppData\Roaming\Media Get LLC

Recorded on 16/08/2016
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.3g2 [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.dv [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.m1v [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.m4v [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.mov [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.mpeg1 [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.mpeg2 [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.mpeg4 [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.ogv [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.torrent [mediagettorrentfile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\.ts [mediagetvideofile]
FOUND key: HKEY_USERS\S-1-5-21-3853951813-4111076256-186396457-1000\SOFTWARE\Classes\mediagetvideofile [MediaGet2 video file]
FOUND value: HKLM\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\firewallRules\\{696C3E0F-20A6-4F70-99DF-F63E25FFA83C} [C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe]
FOUND value: HKLM\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\firewallRules\\{D8ABA262-C12B-4A6B-B4C3-D052CD86068F} [C:\Users\Coolman\AppData\Local\MediaGet2\mediaget.exe]

Alias

AegisLab Troj.Downloader.W32.Mediaget!c 20160815
AhnLab-V3 Adware/Win32.MediaGet.N583024011 20160815
Antiy-AVL Trojan[Downloader:not-a-virus]/Win32.MediaGet 20160816
Avast Win32:MediaGet-J [PUP] 20160816
Avira (no cloud) PUA/Mediaget.B 20160815
Bkav W32.HfsAdware.85D9 20160815
CAT-QuickHeal Downloader.MediaGet.B3 20160813
CMC Downloader.Win32.MediaGet!O 20160811
ClamAV Win.Adware.Mediaget-30 20160815
Comodo Application.Win32.MediaGet.G 20160816
Cyren W32/MediaGet.A.gen!Eldorado 20160816
DrWeb Program.MediaGet.46 20160816
ESET-NOD32 a variant of Win32/MediaGet potentially unwanted 20160815
F-Prot W32/MediaGet.A.gen!Eldorado 20160816
Fortinet Riskware/MediaGet 20160816
GData Win32.Adware.MediaGet.D 20160816
K7AntiVirus Unwanted-Program (004ae6391) 20160815
K7GW Unwanted-Program (004ae6391) 20160815
Kaspersky not-a-virus:Downloader.Win32.MediaGet.dxp 20160815
Malwarebytes PUP.Optional.MediaGet 20160815
McAfee Artemis!750B6E187172 20160815
NANO-Antivirus Trojan.Win32.MediaGet.dzgkqq 20160815
Rising Malware.Generic!0LT4hWyhqyQ@5 (Thunder) 20160815
SUPERAntiSpyware PUP.MediaGet/Variant 20160815
Sophos MediaGet (PUA) 20160815
Yandex PUA.Downloader! 20160815
nProtect Trojan/W32.Agent_Packed.703848 20160812

Associate Editors

MediaGet LLC

Some products

MediaGet
MediaGet2

MD5 encryption

021E8367C1EF29D584F67C936D6DA987
1F4416D1F62941F88CE09FABCD82D6CB

Serial number

00AE2F0B53DD74EA62BD9A5322DC2C5632

How to remove MediaGet?

Delete with Windows

Delete with ZHPCleaner

   Delete with ZHPSuite

Responsibility :   The principle of absence of responsibility of the original site, with regard to the contents of the targeted target sites, is recalled by the judgment of September 19, 2001 of the Paris Court of Appeal. The comments I make here reflect my opinion and are suggestions - the visitor is not obliged to follow them.

About the Author

Back to top