Home / Spyware Encyclopedia / Rootkit.Mag.gen << Back

Recommendation to Automatically remove Rootkit.Mag.gen


Our products can remove Rootkit.Mag.gen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Mag.gen Details


  • Category Rootkit
  • Discovered 4/10/2015 11:39:55 PM
  • Modified 3/4/2024 10:11:12 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b8a25f1c.exe 12383  61ec65b20358e49bab1d7e95e3287676 
f81175a7.exe 20992  a3fc24b7ef673123ffafca7709644949 
trojan-gamethief.win32.onlinegames.uasm 20992  dd6c4be410ecd8314464e8f2f16dc418 
rootkit.win32.agent.dum 19712  61dfc99aabca9b579d0809821246bc2b 
39a062f7365566257089eae6bb679a201604e9e1.{pe}.exe 9120  ab6ab59056c24c0c6a0c5d5a6bac18b7 
2357b9c7e8028915f4869c46208592c6.sys 20992  2357b9c7e8028915f4869c46208592c6 
0b582dae97527f9c73fe6b4be11ac4dee40ffa85c4f04151607cb07ca91fb2e3a54ebddbe6c1fa1249aa83daba46c268118.sys 20992  4db4bf85bb92ee0ad138bf509f50905e 
7e48a2d72ddeacc046eff576535fa815.sys 12298  7e48a2d72ddeacc046eff576535fa815 
e53828a292f2c46ee5d9ed3756b13eb1dfa80f899cb22e0b2ce03911c827672a5efbdc549d63ee9f34df35335dec4d4514c.sys 12249  e417395c8d0a54604c23c0ef62db951a 
ff8997910f7e64ad7523407d037e0c770186c6fff9d7d458107fccf0efabf6b46b30a22f3ff8d5ee37d5990c2733ec7f376.sys 20992  8e0e1a053b728619eb3e72ec200533fb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware