Controls Section

Besides our logo, this shows controls that have "global" actions on the interface, items or the program.

Control Explanation
"Details Section"
Shows or hides the "Detail Section", giving more or less room to the "Items List".
"Expert Columns"

Shows or hides a number of columns in the "Items List" section that are only interesting to experienced users.

"Online Analyzer"

This is probably the most important function of the program.

Sends the contents of "Items List" to the "Triage" Server.

"Save Log"
Launches a dialog where you choose the type and the location where you want the log file saved.
If you can't figure out for yourself what this button does, you shouldn't be using this program. :)

Items List

This is probably the most important part of the program. Each detected item is represented by a line in this list.

Icon Explanation

Known and trusted items are highlighted with a green icon. You can be sure these processes are safe and might be an important part of your operating system.

Potentially dangerous spyware components or adware components are highlighted with a red icon.
Note that you can double-click the line to remove any item.

Items which the experts have not analyzed yet are shown with a gray icon.


Column Explanation
Name Simply the name of the program, or unique identifier. This can be the registry key, class name or something else. Some programs use CLSID's for names.
CLSID Short for Class Id. CLSID is an identification tag that's associated with an ActiveX or OLE 2.0 object created by a specific component or server. CLSID values appear in the Registry and must be unique for each type of object that the server (your PC) can create.
URL (Uniform Resource Locator) - The World Wide Web address of a site on the Internet. Often you can find out where the file was installed from using the URL.
Filename Filename is the full filepath of the running process or component
FileSize This is the size of the program or component that is being analyzed. This is expressed in bytes.
MD5 A hash function such as MD5 is a one-way operation that transforms a data string of any length into a shorter, fixed-length value.
Its main purpose here is to provide a tamper-proof way of identifying a file. If the MD5s of two files are equal, you can be sure that the files are completely identical in content. The name and location of the file are not included in the calculation of the checksum.
Kind This is an internal classification of the component. For example some are Toolbars, BHOs, or Downloaded Program Files.
Triage Just as nurses and doctors triage patients X-RayPC technicians triage software components. Triage is a method of ranking software. Here you can see "Good", "Bad", or "Unknown". Note that the icon changes color accordingly.

Other Funtionalities

  • Single click an item to view its details in the "Details Section"
  • Double-click an item to deactivate or remove it
  • Resize columns by dragging the divider between columns
  • Rearrange the order of the columns by dragging the column header to another spot
  • Sort Items by clicking the column header of the column on which to sort

Details Section

Note: This section can be hidden in the "Controls Section", so if you can't find it look over there first.

Depending on the item whether the item chosen has a file attached, and whether the item is identified, 2 subpanels can be visible.

File Details

Lists full pathname, filesize, date, MD5, icon and file copyright information.

Product Details

If the item is detected as "Good" or "Bad", the product name is shown, with optionally a URL.

Other Funtionalities

  • Single click any details label (e.g. MD5) to copy its contents to the clipboard
  • If a URL is visible, click it to visit the website using your default internet browser.


© Copyright 2006, Actiance, Inc. All rights reserved.