Startup List Results
Startup Entry
Startup Entry
Name | Filename | Description | Status |
DLL32 | dllhost.dll | Added by the WORM_SUCLOVE.A WORM! Note: Located in \%WINDIR%\System32\ | X |
DLL32 | dllhost.dll | Added by the W32.Suclove.A@mm WORM! Note: Located in \%WINDIR%\System32\ | X |
Gilat SOM Enumerator | dllhost.exe | For Gilat Communications internet satellite systems - associated with SkyBlaster modem. Required if you have this system | Y |
Windows Services | dllhost.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
(Default) | dllhost.com | Added by the Virus.Win32.VB.bp Note: Located in \%WINDIR%\%System%\ Note: This entry is loaded through one of the "Policies" startup keys. | X |
O23 List Results
Windows Services
Windows Services
Name | Filename | Description | Status |
COM+ System Application (COMSysApp) | dllhost.exe | Part of Windows Vista Note: Located in C:\%WINDIR%\System32 | L |
COM+ System Applications (COMSystemApp) | dllhost.exe | W32/SillyFDC-AV Note: Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (Vista/XP/WinNT/2K) Turns off anti-virus applicationsand Steals information | X |
COM+ System Service (DLLHOST) | dllhost.exe | Added by the Backdoor.Win32.SdBot.xd as identified by Kaspersky TROJAN! Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) | X |
Dynamic Library Host (DLLHOSTS) | dllhost.exe | Added by an unidentified TROJAN! Note: of the Win32/Rbot Family. Note: Note: This worm\trojan is located in C:\%WINDIR%\ Note: More here | X |
Windows Host Services (DLLHOST32) | dllhost.exe | Added by the W32/Tilebot-IH WORM! Note: This worm\trojan is located in C:\%WINDIR%\System\ folder. | X |
Drivers List Results
Driver Entry
Driver Entry
Name | Filename | Description | Status |
Symantec SymSnap VSS Provider | dllhost.exe | Related to dllhost.exe Symantec SymSnap VSS Provider from Symantec Corp. | L |
COMSysApp | dllhost.exe | Related to Windows servicethat manages the configuration and tracking of Component Object Model (COM)+-based components : Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}from Microsoft Corp. | L |
Active Setup List Results
Active Setup - Installed Component
Active Setup - Installed Component
CLSID | Name | Filename | Description | Status |
{XMUA366W-06JY-307O-6F8H-55J6ES0AQHB5} | (no name) | dllhost.exe | Infostealer trojan, detected by Microsoft as Worm:Win32/Rebhip.A, also see here | X |
{Q0P4U32S-07MY-85R3-63YF-N010418014LO} | (no name) | dllhost.exe | Infostealer trojan, detected by Kaspersky antivirus as Trojan.Win32.Buzus.nwnq | X |