What is TBOYUN.DLL and is it safe?
Below is a description of TBOYUN.DLL. This application may not be safe to have on your computer. If this application is running on your computer, it is advised that you scan your computer for both viruses and malware immediately.
Click here to download SUPERAntiSpyware to block and remove TBOYUN.DLL and other harmful applications.
Summary of TBOYUN.DLL
Trojan.Agent/Gen.Toolbar
Company Information
Unknown
Description of TBOYUN.DLL
Randomly named Internet Explorer toolbar. Contains no version or company information and is typically installed in Windows System folder or the root Windows folder. Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect. A large segment of trojan programs download other harmful software components to a user's PC without his/her knowledge. This application is most likely downloaded and installed by another application that is considered to be adware or spyware.
Threat Level (1-10)
5
Processes
TBOYUN.DLL
CLSID List
{24EA8786-1F55-262B-30F7-117F18136EA9}
{23CF397E-FF5C-F9B7-9221-D94766948ADB}
{D84F671A-EB13-F2A3-44E7-2B84D64A99E5}
{C4E457A6-D560-D735-1AF6-BD83363505D4}
{CF1E70B2-6818-9488-DAC4-36F068F59828}
{554BEAA6-3372-5AC0-D261-3896161A4473}
{C6368C5E-975B-8CC6-9069-67DA1BA51FDE}
{62BF7836-7767-57C1-6FBF-1AA41AED7183}
{6D3DA169-6663-42F6-847E-6E877F5941F0}
{C40D098A-4F62-3338-4D33-F6F2D675DE47}
{69014092-2059-4E84-1DBF-A3F81DD341A4}
{A8B0BDED-64A5-495B-97DA-42C0301E229B}
{FF11E082-B236-8C0C-7AAD-8C8C8EBDAD2F}
{3CE14D42-145C-6091-92CB-9FD68C0B9611}
{98BB3342-4CF9-CEE3-F1FE-917641B7B44C}
{A2F68F3E-4202-D0A3-2ADE-D9626BD49E96}
{AE84F132-F05C-A0CB-3F68-8154015F138E}
{4E7BD74F-2B8D-469E-89BE-FD60BB9AAE30}
{C30F019E-6405-2C65-CD6E-F1422877A82F}
{9BD98F4E-A5DD-8A78-7DD7-B24BCE2DCC4F}
{B971B60E-4E7F-9637-AFC6-0203255900E1}
{C9782596-917B-611E-D496-4CAA3B9BB18E}
{6B9B63BE-7C02-A15E-69D3-D26D99DC1324}
{BED58292-1E60-11DB-9B1E-F7713BCFCB49}
{836467E9-04B7-4970-B282-B3D652CBFC24}
{FC785E62-AB6F-5374-9C2F-7E46FB4E241A}
{3A32D9EE-97B0-7459-116D-D59A3B91DF59}
{EC334EFE-246C-8640-3FC4-684D2D1B61C4}
{FDB03206-EA5D-4FCF-8F90-0CF15B20B36F}
{0DCCF49D-643C-4C21-8CBB-36C4F3EDD7FA}
{4E7BD74F-2B8D-469E-A1E4-EA6FA787AD2D}
{DBBB7978-AF21-4EF4-9AD1-B2F4BC75696C}
{20EEA52F-4069-4D60-AD20-17DE2EAE67EE}
{D3618266-F57C-8495-52FC-19880119585B}
{5C419326-6F16-7F3F-6C28-075803D542B2}
{A5AF6E2A-C888-884D-0034-636EBD8F74E8}
{FA33B29E-467A-AE11-4EF4-FF60C63D6EEC}
{5FE60D61-0826-11D6-A3C8-00E0299A95BF}
{11A69AE4-FBED-4832-A2BF-45AF82825583}
{422CA3AF-86F1-4607-88E2-BBBD4E9371EB}
{2181E54F-274D-48B7-9E51-BC374933CD24}
{E3ED01B7-EAF2-4A33-989C-B95E65DA0415}
{CBF19702-9D5B-44E7-8F8A-6750209B76F3}
Return to the Malware Research page.