About

UTASSSRZ.DLL Malware Application/Process Description

Below is a description of UTASSSRZ.DLL. This application may not be safe to have on your computer. If this application is running on your computer, it is advised that you scan your computer for both viruses and malware immediately.

Click here to download SUPERAntiSpyware to block and remove UTASSSRZ.DLL and other harmful applications.

Download SUPERAntiSpyware Now!

Summary of UTASSSRZ.DLL

Trojan.Agent/Gen.Toolbar

Company Information

Unknown

Description of UTASSSRZ.DLL

Randomly named Internet Explorer toolbar. Contains no version or company information and is typically installed in Windows System folder or the root Windows folder. Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect. A large segment of trojan programs download other harmful software components to a user's PC without his/her knowledge. This application is most likely downloaded and installed by another application that is considered to be adware or spyware.

Threat Level (1-10)

5

Processes

UTASSSRZ.DLL

CLSID List

{24EA8786-1F55-262B-30F7-117F18136EA9}
{23CF397E-FF5C-F9B7-9221-D94766948ADB}
{D84F671A-EB13-F2A3-44E7-2B84D64A99E5}
{C4E457A6-D560-D735-1AF6-BD83363505D4}
{CF1E70B2-6818-9488-DAC4-36F068F59828}
{554BEAA6-3372-5AC0-D261-3896161A4473}
{C6368C5E-975B-8CC6-9069-67DA1BA51FDE}
{62BF7836-7767-57C1-6FBF-1AA41AED7183}
{6D3DA169-6663-42F6-847E-6E877F5941F0}
{C40D098A-4F62-3338-4D33-F6F2D675DE47}
{69014092-2059-4E84-1DBF-A3F81DD341A4}
{A8B0BDED-64A5-495B-97DA-42C0301E229B}
{FF11E082-B236-8C0C-7AAD-8C8C8EBDAD2F}
{3CE14D42-145C-6091-92CB-9FD68C0B9611}
{98BB3342-4CF9-CEE3-F1FE-917641B7B44C}
{A2F68F3E-4202-D0A3-2ADE-D9626BD49E96}
{AE84F132-F05C-A0CB-3F68-8154015F138E}
{4E7BD74F-2B8D-469E-89BE-FD60BB9AAE30}
{C30F019E-6405-2C65-CD6E-F1422877A82F}
{9BD98F4E-A5DD-8A78-7DD7-B24BCE2DCC4F}
{B971B60E-4E7F-9637-AFC6-0203255900E1}
{C9782596-917B-611E-D496-4CAA3B9BB18E}
{6B9B63BE-7C02-A15E-69D3-D26D99DC1324}
{BED58292-1E60-11DB-9B1E-F7713BCFCB49}
{836467E9-04B7-4970-B282-B3D652CBFC24}
{FC785E62-AB6F-5374-9C2F-7E46FB4E241A}
{3A32D9EE-97B0-7459-116D-D59A3B91DF59}
{EC334EFE-246C-8640-3FC4-684D2D1B61C4}
{FDB03206-EA5D-4FCF-8F90-0CF15B20B36F}
{0DCCF49D-643C-4C21-8CBB-36C4F3EDD7FA}
{4E7BD74F-2B8D-469E-A1E4-EA6FA787AD2D}
{DBBB7978-AF21-4EF4-9AD1-B2F4BC75696C}
{20EEA52F-4069-4D60-AD20-17DE2EAE67EE}
{D3618266-F57C-8495-52FC-19880119585B}
{5C419326-6F16-7F3F-6C28-075803D542B2}
{A5AF6E2A-C888-884D-0034-636EBD8F74E8}
{FA33B29E-467A-AE11-4EF4-FF60C63D6EEC}
{5FE60D61-0826-11D6-A3C8-00E0299A95BF}
{11A69AE4-FBED-4832-A2BF-45AF82825583}
{422CA3AF-86F1-4607-88E2-BBBD4E9371EB}
{2181E54F-274D-48B7-9E51-BC374933CD24}
{E3ED01B7-EAF2-4A33-989C-B95E65DA0415}
{CBF19702-9D5B-44E7-8F8A-6750209B76F3}

Return to the Malware Research page.