Global Search

Not sure what a file is? Sort through the possibilities with a quick search of all of the lists.
Or get more accurate results by browsing and searching by list.
CLSID List Results
BHOs, Toolbars, SHs, Explorer Bars

CLSID Name Filename Description Status
{B3A05538-8F91-49C1-8EE3-6EB142B41E2A}HelloWorldBHO, Microsoft HelpMicrosoft.System.Help.dll, Microsoft.System.Help.Object.dll, Microsoft.System.Help.Library.dllKeyword hijacker redirecting to find.fm and bestsamara.org, detected by Kaspersky antivirus as Trojan.Win32.BHO.esX BHO
{11111111-1111-1111-1111-110611561119}6d9e5b4b83b642dda6872290d49
2b0fa0065619, System Support
System Support-bho.dll, System Support-bho64.dllCrossrider cross-browser plugin, often bundled with third party software or part of an adware bundle - detected as Adware.CrossRider and by Malwarebytes Anti-Malware as "PUP.Optional.CrossRider" or "PUP.Optional.SystemSupport.A" - also see hereX BHO
{11111111-1111-1111-1111-110211701196}CrossriderApp0027096, Services x86Services x86.dll, Services x86-bho.dllCrossrider cross-browser plugin, detected as Adware.GamePlayLabs or Adware.CrossRider and by Malwarebytes Anti-Malware as PUP.215Apps, PUP.CrossFire or PUP.CrossRiderX BHO
{67A06BB1-027B-4E94-8C3D-2DCD5E808A28}IHiu ClassServices.dll, AYBHOAD.dllParasite of Chinese origin, a variant of the Win-Clicker/Puper.73728 trojan - also detected as Trojan.HIUX BHO
{BE1962AB-3E8F-422a-934D-12E1AD39AF4C}XBTB00664intermedia-services.com.dll, INTERM~*.DLLFlatland.net Toolbar - a Softomate Toolbar variant - Softomate customizes toolbars to customers needs. The dll files for their toolbars contain some spyware/adware functionality, although not all of the toolbars use this.O BHO

Startup List Results
Startup Entry

Name Filename Description Status
system.exesystem.exeAdded by the Win32/Jampork.E WORM! Note: Located in \%WINDIR%\System32\ Note: Win32/Jampork.E attempts to spread via removable disks (such as USB sticks and flash drives).X
winlogonsystem.exeIdentified as a variant of the Trojan-Downloader.Win32.Delf.cns malware. Note: Located in \%WINDIR%\System32\drivers\X
Windows Update Softwaresystem.exeAdded by the TSPY_TOFGER.BX TROJAN! Note: Located in \%WINDIR%\System32\X
windows runsystem.exeAdded by the W32/Icpass-A WORM! Note: Located in \%WINDIR%\System32\X
Windows DLL Servicessystem.exeAdded by the TSPY_AGENT.H SPYWARE! Note: Located in %Spyware path%\X

O18 List Results
Extra Protocols

CLSID Name Filename Description Status
{53B95211-7D77-11D2-9F81-00104B107C96}start, aboutMSXWORD.DLL, SYSTEM***.dll (*** random digits)CoolWebSearch parasite variantX Protocol, Protocol hijack
{E1D2BF40-A96B-11d1-9C6B-0000F875AC61}http\oledb, https\oledb, msdaipp\oledb%ProgramFiles%\Common Files\SYSTEM\OLE DB\msdaipp.dllMicrosoft Data Access Component Internet Publishing Provider Note: item whitelisted by HijackThisL Protocol
O20 List Results
AppInit_DLLs & Winlogon Notify

Name Filename Description Status
(no name)%SYSDIR%\services.dllPurityScan variantX AppInit_DLLs
O21 List Results
ShellServiceObjectDelayLoad

CLSID Name Filename Description Status
{F28A40D7-AD0E-034A-C651-5F0ED76232E6}Internet Explorer%System%\[RANDOM NAME].dllBackdoor.Berbew.TX
{000000A0-0000-0000-0000-000000000011}Keysaver%System%\Keysaver.dllTrojan-Dropper.Win32.SmallX
{BCBCD383-3E06-11D3-91A9-00C04F68105C}AUHookC:\WINDOWS\SYSTEM\AUHOOK.DLLWindows ME Microsoft AutoUpdateL
O23 List Results
Windows Services

Name Filename Description Status
Windows System ControllerSystem.exeAdded by the WORM_SDBOT.BLC WORM! Note: This worm\trojan is located in C:\%WINDIR%\ folder.X
systemsystem.exeAdded by an unidentified TROJAN! Note: of the Win32/Rbot Family. Note: This worm\trojan is located in C:\%WINDIR%\ folderX
systemboot (systemboot)System.exeAdded by the SDBOT.CDM WORM! Note: Read the link, rootkit type stealth involved.X
Windows DHCP Servicesystem.exeAdded by a variant of the W32/SDBOT WORM! Note: This worm\trojan is located in C:\%WINDIR%\ folder.X
SCA (Service Control Application)SYSTEM.EXEUnknown virusX

SEH List Results
ShellExecuteHook

CLSID Name Filename Description Status
{6E44887F-5214-41F2-AB46-4728735C4CC6}(no name)%Program Files%\Internet Explorer\PLUGINS\system.sys, system3.sys, System*.sys, system**.sysInfostealer trojan, detected by Kaspersky antivirus as Trojan-PSW.Win32.QQPass.qi - also see hereX
{7A238B14-A6F1-11E0-9A84-00C04FD8DBD8}(no name)%SYSDIR%\system.dllTR/PSW.Small.BS.4X
{59659854-7415-1025-5982-789541250195}(no name)%System%\WinSysms_1.dllInfostealer.GampassX
{ACADABAF-1000-0010-8000-10AA006D2EA4}(no name)%SYSDIR%\system.datTROJ_DLOADER.AAL trojanX
{40AA9D3D-BFB8-4B9F-A0E6-8913EDAC6779}(no name)%COMMONPROGRAMFILES%\System\bho.dllInfostealer trojan, detected by Kaspersky antivirus as Trojan.Win32.Swisyn.adfc - also see hereX

Drivers List Results
Driver Entry

Name Filename Description Status
OrbisClient.ServicesOrbisClient.Services.exeRelated to OrbisClient.Services.exe Comprehensive Security courseware to date. With over 60 lab simulations, LabSim for Security Pro will give you the knowledge and the experience you need to enter the industry as an entry-level IT security administrator from TestOut Corporation®L
system-updateservicesystem-update-se.exeSystem-Update, a parasite of Korean origin hailing from system-update.co.kr and detected by MBAM as "Rogue.SystemUpdate.K"X
AutoProcessAMG Attendance System.exeRelated to the AMG Attendance System.exe Card Reader Time and Attendance Software from AMG Attendance SystemL
FF Extensions List Results
Firefox Extension

CLSID Name Filename Description Status
system-monitor@clear-code.comSystem Monitorsystem-monitor@clear-code.com.xpiSystem Monitor provides CPU usage and memory usage graphs on the toolbar.L
disable-system-alerts@matthew.noorenberghe.comDisable System Alertsdisable-system-alerts@matthew.noorenberghe.com.xpiDisable System Alerts disables integration with the system alert/notification service such as OS X Notification Center and libnotify.L
Active Setup List Results
Active Setup - Installed Component

CLSID Name Filename Description Status
{JDNFMB03-K156-1J54-176T-H5SGQAUF1ATH}(no name)Services.exe Infostealer trojan, detected by Microsoft as VirTool:MSIL/Injector.gen!A, see hereX
{5SEE5RH5-C8N0-G86Y-78T3-V4G5382A3U5C}(no name)services.exeInfostealer trojan, detected by Microsoft as Worm:Win32/Rebhip.A - also see hereX
{51SW6ENN-P584-25G0-1DX4-38T8MSFT6UGO2}(no name)services.exeInfostealer trojan, see hereX
{DDA46FB1-E4EB-AAA3-AFEE-EF6FEF22C279}(no name)Services.exeInfostealer trojan, see this ThreatExpert ReportX
{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}(no name)services.exeInfostealer trojan, a variant of Troj/Nopride-A - see this ThreatExpert ReportX

Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use