|  | 
| user32.dll ( 5.1.2600.1134)
| Contained in software | 
|---|
 | Name: | Windows XP Home Edition, Deutsch | 
|---|
 | License: | commercial | 
|---|
 | Information link: | http://www.microsoft.com/windowsxp/ | 
|---|
 | File details | 
|---|
 | Filepath: | C:\WINDOWS\$NtUninstallKB824141$ \ user32.dll | 
|---|
 | Filedate: | 2002-11-22 20:28:16 | 
|---|
 | Version: | 5.1.2600.1134 | 
|---|
 | Filesize: | 530.432 bytes | 
|---|
 | Checksum and file hashes | 
|---|
 | CRC32: | 967A01EF | 
|---|
 | MD5: | DB15 B2FE 24EC CE33 1EA3 A954 F6F9 0448 | 
|---|
 | SHA1: | 51AE 4410 6AD4 F751 DCDA 4C0A 690E 3047 0F0E 22A1 | 
|---|
 | Version resource information | 
|---|
 | CompanyName: | Microsoft Corporation | 
|---|
 | FileDescription: | Client-DLL für Windows XP USER-API | 
|---|
 | FileOS: | Windows NT, Windows 2000, Windows XP, Windows 2003 | 
|---|
 | FileType: | Dynamic Link Library (DLL) | 
|---|
 | FileVersion: | 5.1.2600.1134 | 
|---|
 | InternalName: | user32 | 
|---|
 | LegalCopyright: | © Microsoft Corporation. Alle Rechte vorbehalten. | 
|---|
 | OriginalFilename: | user32 | 
|---|
 | ProductName: | Betriebssystem Microsoft® Windows® | 
|---|
 | ProductVersion: | 5.1.2600.1134 | 
|---|
 
 user32.dll was found in the following malware reports:
|  | 
|---|
 | JS.Rootlet.A@m | 
|---|
 | Technical details ...Mapi32.dll.js User32.dll.js Wsock32.dll.js...
 Source: http://securityresponse.symantec.com/avcenter/venc/data/js.rootlet.a@m.html
 | 
|---|
 | Ceydem.6750.Worm | 
|---|
 | Technical details ...The worm copies itself to %windir%CeyDem.com, %windir%WinuserUser32.dll, and %windir%Winuser2Sexy_jpg.com....
 Source: http://securityresponse.symantec.com/avcenter/venc/data/ceydem.6750.worm.html
 | 
|---|
 | W32.Simile | 
|---|
 | Technical details ...the host file (the file that is infected with the virus) imports the Windows file User32.dll, then on the 17th of March, June, September, or December, a message is displayed....
 Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html
 | 
|---|
 | W95.Sleepyhead.5632 | 
|---|
 | Technical details ...for Kernel32.dll functions. Then it loads User32.dll and WSock32.dll libraries and searches for functions in them....
 Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.sleepyhead.5632.html
 | 
|---|
 | Symantec Vulnerability Assessment 1.0 Vulnerability Updates | 
|---|
 | Variable Buffer Overflow Vulnerability 8827 Host Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 8828 Host Microsoft Windows Help And Support... Source: http://securityresponse.symantec.com/avcenter/security/Content/2003.11.06.html
 | 
|---|
 | Symantec Vulnerability Assessment 1.0 Vulnerability Updates | 
|---|
 | Engine Remote Code Execution Vulnerability 8827 Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 10113 Microsoft Negotiate SSP Remote Buffer... Source: http://securityresponse.symantec.com/avcenter/security/Content/2004.06.30a.html
 | 
|---|
 | CodeRed II | 
|---|
 | Technical details ...closesocket, and WSAGetLastError. From User32.dll, it gets ExitWindowsEx, which the worm uses to reboot the system....
 Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.ii.html
 | 
|---|
 | CodeRed.F | 
|---|
 | Technical details ...closesocket, and WSAGetLastError. From User32.dll, the worm gets ExitWindowsEx, which it uses to restart the system....
 ......
 Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.f.html
 | 
|---|
 |  |