About

TB45577.DLL Malware Application/Process Description

Below is a description of TB45577.DLL. This application may not be safe to have on your computer. If this application is running on your computer, it is advised that you scan your computer for both viruses and malware immediately.

Click here to download SUPERAntiSpyware to block and remove TB45577.DLL and millions of other harmful applications.

Download SUPERAntiSpyware Now!

Summary of TB45577.DLL

Trojan.Agent/Gen.Toolbar

Company Information

Unknown

Description of TB45577.DLL

Randomly named Internet Explorer toolbar. Contains no version or company information and is typically installed in Windows System folder or the root Windows folder. Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect. A large segment of trojan programs download other harmful software components to a user's PC without his/her knowledge. This application is most likely downloaded and installed by another application that is considered to be adware or spyware.

Threat Level (1-10)

5

Processes

TB45577.DLL

CLSID List

{24EA8786-1F55-262B-30F7-117F18136EA9}
{23CF397E-FF5C-F9B7-9221-D94766948ADB}
{D84F671A-EB13-F2A3-44E7-2B84D64A99E5}
{C4E457A6-D560-D735-1AF6-BD83363505D4}
{CF1E70B2-6818-9488-DAC4-36F068F59828}
{554BEAA6-3372-5AC0-D261-3896161A4473}
{C6368C5E-975B-8CC6-9069-67DA1BA51FDE}
{62BF7836-7767-57C1-6FBF-1AA41AED7183}
{6D3DA169-6663-42F6-847E-6E877F5941F0}
{C40D098A-4F62-3338-4D33-F6F2D675DE47}
{69014092-2059-4E84-1DBF-A3F81DD341A4}
{A8B0BDED-64A5-495B-97DA-42C0301E229B}
{FF11E082-B236-8C0C-7AAD-8C8C8EBDAD2F}
{3CE14D42-145C-6091-92CB-9FD68C0B9611}
{98BB3342-4CF9-CEE3-F1FE-917641B7B44C}
{A2F68F3E-4202-D0A3-2ADE-D9626BD49E96}
{AE84F132-F05C-A0CB-3F68-8154015F138E}
{4E7BD74F-2B8D-469E-89BE-FD60BB9AAE30}
{C30F019E-6405-2C65-CD6E-F1422877A82F}
{9BD98F4E-A5DD-8A78-7DD7-B24BCE2DCC4F}
{B971B60E-4E7F-9637-AFC6-0203255900E1}
{C9782596-917B-611E-D496-4CAA3B9BB18E}
{6B9B63BE-7C02-A15E-69D3-D26D99DC1324}
{BED58292-1E60-11DB-9B1E-F7713BCFCB49}
{836467E9-04B7-4970-B282-B3D652CBFC24}
{FC785E62-AB6F-5374-9C2F-7E46FB4E241A}
{3A32D9EE-97B0-7459-116D-D59A3B91DF59}
{EC334EFE-246C-8640-3FC4-684D2D1B61C4}
{FDB03206-EA5D-4FCF-8F90-0CF15B20B36F}
{0DCCF49D-643C-4C21-8CBB-36C4F3EDD7FA}
{4E7BD74F-2B8D-469E-A1E4-EA6FA787AD2D}
{DBBB7978-AF21-4EF4-9AD1-B2F4BC75696C}
{20EEA52F-4069-4D60-AD20-17DE2EAE67EE}
{D3618266-F57C-8495-52FC-19880119585B}
{5C419326-6F16-7F3F-6C28-075803D542B2}
{A5AF6E2A-C888-884D-0034-636EBD8F74E8}
{FA33B29E-467A-AE11-4EF4-FF60C63D6EEC}
{5FE60D61-0826-11D6-A3C8-00E0299A95BF}
{11A69AE4-FBED-4832-A2BF-45AF82825583}
{422CA3AF-86F1-4607-88E2-BBBD4E9371EB}
{2181E54F-274D-48B7-9E51-BC374933CD24}
{E3ED01B7-EAF2-4A33-989C-B95E65DA0415}
{CBF19702-9D5B-44E7-8F8A-6750209B76F3}

Return to the Malware Research page.