|
user32.dll ( 5.1.2600.1134)
Contained in software |
Name: | Windows XP Home Edition, Deutsch |
License: | commercial |
Information link: | http://www.microsoft.com/windowsxp/ |
File details |
Filepath: | C:\WINDOWS\$NtUninstallKB824141$ \ user32.dll |
Filedate: | 2002-11-22 20:28:16 |
Version: | 5.1.2600.1134 |
Filesize: | 530.432 bytes |
Checksum and file hashes |
CRC32: | 967A01EF |
MD5: | DB15 B2FE 24EC CE33 1EA3 A954 F6F9 0448 |
SHA1: | 51AE 4410 6AD4 F751 DCDA 4C0A 690E 3047 0F0E 22A1 |
Version resource information |
CompanyName: | Microsoft Corporation |
FileDescription: | Client-DLL für Windows XP USER-API |
FileOS: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
FileType: | Dynamic Link Library (DLL) |
FileVersion: | 5.1.2600.1134 |
InternalName: | user32 |
LegalCopyright: | © Microsoft Corporation. Alle Rechte vorbehalten. |
OriginalFilename: | user32 |
ProductName: | Betriebssystem Microsoft® Windows® |
ProductVersion: | 5.1.2600.1134 |
user32.dll was found in the following malware reports:
|
JS.Rootlet.A@m |
Technical details ...Mapi32.dll.js User32.dll.js Wsock32.dll.js... Source: http://securityresponse.symantec.com/avcenter/venc/data/js.rootlet.a@m.html |
Ceydem.6750.Worm |
Technical details ...The worm copies itself to %windir%CeyDem.com, %windir%WinuserUser32.dll, and %windir%Winuser2Sexy_jpg.com.... Source: http://securityresponse.symantec.com/avcenter/venc/data/ceydem.6750.worm.html |
W32.Simile |
Technical details ...the host file (the file that is infected with the virus) imports the Windows file User32.dll, then on the 17th of March, June, September, or December, a message is displayed.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html |
W95.Sleepyhead.5632 |
Technical details ...for Kernel32.dll functions. Then it loads User32.dll and WSock32.dll libraries and searches for functions in them.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.sleepyhead.5632.html |
Symantec Vulnerability Assessment 1.0 Vulnerability Updates |
Variable Buffer Overflow Vulnerability 8827 Host Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 8828 Host Microsoft Windows Help And Support... Source: http://securityresponse.symantec.com/avcenter/security/Content/2003.11.06.html |
Symantec Vulnerability Assessment 1.0 Vulnerability Updates |
Engine Remote Code Execution Vulnerability 8827 Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 10113 Microsoft Negotiate SSP Remote Buffer... Source: http://securityresponse.symantec.com/avcenter/security/Content/2004.06.30a.html |
CodeRed II |
Technical details ...closesocket, and WSAGetLastError. From User32.dll, it gets ExitWindowsEx, which the worm uses to reboot the system.... Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.ii.html |
CodeRed.F |
Technical details ...closesocket, and WSAGetLastError. From User32.dll, the worm gets ExitWindowsEx, which it uses to restart the system.... ...... Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.f.html |
|
|