Global Search

Not sure what a file is? Sort through the possibilities with a quick search of all of the lists.
Or get more accurate results by browsing and searching by list.
Startup List Results
Startup Entry

Name Filename Description Status
DLL32dllhost.dllAdded by the WORM_SUCLOVE.A WORM! Note: Located in \%WINDIR%\System32\X
DLL32dllhost.dllAdded by the W32.Suclove.A@mm WORM! Note: Located in \%WINDIR%\System32\X
Gilat SOM Enumeratordllhost.exeFor Gilat Communications internet satellite systems - associated with SkyBlaster modem. Required if you have this systemY
Windows Servicesdllhost.exeAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
(Default)dllhost.comAdded by the Virus.Win32.VB.bp Note: Located in \%WINDIR%\%System%\ Note: This entry is loaded through one of the "Policies" startup keys.X

O23 List Results
Windows Services

Name Filename Description Status
COM+ System Application (COMSysApp)dllhost.exePart of Windows Vista Note: Located in C:\%WINDIR%\System32L
COM+ System Applications (COMSystemApp)dllhost.exeW32/SillyFDC-AV Note: Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (Vista/XP/WinNT/2K) Turns off anti-virus applicationsand Steals informationX
COM+ System Service (DLLHOST)dllhost.exeAdded by the Backdoor.Win32.SdBot.xd as identified by Kaspersky TROJAN! Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)X
Dynamic Library Host (DLLHOSTS)dllhost.exeAdded by an unidentified TROJAN! Note: of the Win32/Rbot Family. Note: Note: This worm\trojan is located in C:\%WINDIR%\ Note: More hereX
Windows Host Services (DLLHOST32)dllhost.exeAdded by the W32/Tilebot-IH WORM! Note: This worm\trojan is located in C:\%WINDIR%\System\ folder.X

Drivers List Results
Driver Entry

Name Filename Description Status
Symantec SymSnap VSS Providerdllhost.exeRelated to dllhost.exe Symantec SymSnap VSS Provider from Symantec Corp.L
COMSysAppdllhost.exeRelated to Windows servicethat manages the configuration and tracking of Component Object Model (COM)+-based components : Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}from Microsoft Corp.L
Active Setup List Results
Active Setup - Installed Component

CLSID Name Filename Description Status
{XMUA366W-06JY-307O-6F8H-55J6ES0AQHB5}(no name)dllhost.exeInfostealer trojan, detected by Microsoft as Worm:Win32/Rebhip.A, also see hereX
{Q0P4U32S-07MY-85R3-63YF-N010418014LO}(no name)dllhost.exeInfostealer trojan, detected by Kaspersky antivirus as Trojan.Win32.Buzus.nwnqX
Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use