About

What is NHFQIGPT.DLL and is it safe?

Below is a description of NHFQIGPT.DLL. This application may not be safe to have on your computer. If this application is running on your computer, it is advised that you scan your computer for both viruses and malware immediately.

Click here to download SUPERAntiSpyware to block and remove NHFQIGPT.DLL and other harmful applications.

Download SUPERAntiSpyware Now!

Summary of NHFQIGPT.DLL

Trojan.Agent/Gen.Toolbar

Company Information

Unknown

Description of NHFQIGPT.DLL

Randomly named Internet Explorer toolbar. Contains no version or company information and is typically installed in Windows System folder or the root Windows folder. Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect. A large segment of trojan programs download other harmful software components to a user's PC without his/her knowledge. This application is most likely downloaded and installed by another application that is considered to be adware or spyware.

Threat Level (1-10)

5

Processes

NHFQIGPT.DLL

CLSID List

{24EA8786-1F55-262B-30F7-117F18136EA9}
{23CF397E-FF5C-F9B7-9221-D94766948ADB}
{D84F671A-EB13-F2A3-44E7-2B84D64A99E5}
{C4E457A6-D560-D735-1AF6-BD83363505D4}
{CF1E70B2-6818-9488-DAC4-36F068F59828}
{554BEAA6-3372-5AC0-D261-3896161A4473}
{C6368C5E-975B-8CC6-9069-67DA1BA51FDE}
{62BF7836-7767-57C1-6FBF-1AA41AED7183}
{6D3DA169-6663-42F6-847E-6E877F5941F0}
{C40D098A-4F62-3338-4D33-F6F2D675DE47}
{69014092-2059-4E84-1DBF-A3F81DD341A4}
{A8B0BDED-64A5-495B-97DA-42C0301E229B}
{FF11E082-B236-8C0C-7AAD-8C8C8EBDAD2F}
{3CE14D42-145C-6091-92CB-9FD68C0B9611}
{98BB3342-4CF9-CEE3-F1FE-917641B7B44C}
{A2F68F3E-4202-D0A3-2ADE-D9626BD49E96}
{AE84F132-F05C-A0CB-3F68-8154015F138E}
{4E7BD74F-2B8D-469E-89BE-FD60BB9AAE30}
{C30F019E-6405-2C65-CD6E-F1422877A82F}
{9BD98F4E-A5DD-8A78-7DD7-B24BCE2DCC4F}
{B971B60E-4E7F-9637-AFC6-0203255900E1}
{C9782596-917B-611E-D496-4CAA3B9BB18E}
{6B9B63BE-7C02-A15E-69D3-D26D99DC1324}
{BED58292-1E60-11DB-9B1E-F7713BCFCB49}
{836467E9-04B7-4970-B282-B3D652CBFC24}
{FC785E62-AB6F-5374-9C2F-7E46FB4E241A}
{3A32D9EE-97B0-7459-116D-D59A3B91DF59}
{EC334EFE-246C-8640-3FC4-684D2D1B61C4}
{FDB03206-EA5D-4FCF-8F90-0CF15B20B36F}
{0DCCF49D-643C-4C21-8CBB-36C4F3EDD7FA}
{4E7BD74F-2B8D-469E-A1E4-EA6FA787AD2D}
{DBBB7978-AF21-4EF4-9AD1-B2F4BC75696C}
{20EEA52F-4069-4D60-AD20-17DE2EAE67EE}
{D3618266-F57C-8495-52FC-19880119585B}
{5C419326-6F16-7F3F-6C28-075803D542B2}
{A5AF6E2A-C888-884D-0034-636EBD8F74E8}
{FA33B29E-467A-AE11-4EF4-FF60C63D6EEC}
{5FE60D61-0826-11D6-A3C8-00E0299A95BF}
{11A69AE4-FBED-4832-A2BF-45AF82825583}
{422CA3AF-86F1-4607-88E2-BBBD4E9371EB}
{2181E54F-274D-48B7-9E51-BC374933CD24}
{E3ED01B7-EAF2-4A33-989C-B95E65DA0415}
{CBF19702-9D5B-44E7-8F8A-6750209B76F3}

Return to the Malware Research page.