[filename.info logo]
[cn user32.dll][de user32.dll][es user32.dll][fr user32.dll][gb user32.dll][it user32.dll][jp user32.dll][kr user32.dll][nl user32.dll][pt user32.dll][ru user32.dll][us user32.dll]
 

user32.dll (5.1.2600.1255)

Contained in software

Name:Windows XP Home Edition, Deutsch
License:commercial
Information link:http://www.microsoft.com/windowsxp/

File details

Filepath:C:\WINDOWS\system32 \ user32.dll
Filedate:2003-09-25 18:52:01
Version:5.1.2600.1255
Filesize:561.664 bytes

Checksum and file hashes

CRC32:A631EEAA
MD5:8D92 8268 AFBF 31F8 A34C E610 DA17 5352
SHA1:810B ACB5 B6A0 037E 24DC 0F23 9AA6 5DC2 7F63 54CD

Version resource information

CompanyName:Microsoft Corporation
FileDescription:Client-DLL für Windows XP USER-API
FileOS:Windows NT, Windows 2000, Windows XP, Windows 2003
FileType:Dynamic Link Library (DLL)
FileVersion:5.1.2600.1255
InternalName:user32
LegalCopyright:© Microsoft Corporation. Alle Rechte vorbehalten.
OriginalFilename:user32
ProductName:Betriebssystem Microsoft® Windows®
ProductVersion:5.1.2600.1255

user32.dll was found in the following malware reports:

JS.Rootlet.A@m

Technical details
...Mapi32.dll.js User32.dll.js Wsock32.dll.js...
Source: http://securityresponse.symantec.com/avcenter/venc/data/js.rootlet.a@m.html

Ceydem.6750.Worm

Technical details
...The worm copies itself to %windir%CeyDem.com, %windir%WinuserUser32.dll, and %windir%Winuser2Sexy_jpg.com....
Source: http://securityresponse.symantec.com/avcenter/venc/data/ceydem.6750.worm.html

W32.Simile

Technical details
...the host file (the file that is infected with the virus) imports the Windows file User32.dll, then on the 17th of March, June, September, or December, a message is displayed....
Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html

W95.Sleepyhead.5632

Technical details
...for Kernel32.dll functions. Then it loads User32.dll and WSock32.dll libraries and searches for functions in them....
Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.sleepyhead.5632.html

Symantec Vulnerability Assessment 1.0 Vulnerability Updates

Variable Buffer Overflow Vulnerability 8827 Host Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 8828 Host Microsoft Windows Help And Support...
Source: http://securityresponse.symantec.com/avcenter/security/Content/2003.11.06.html

Symantec Vulnerability Assessment 1.0 Vulnerability Updates

Engine Remote Code Execution Vulnerability 8827 Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 10113 Microsoft Negotiate SSP Remote Buffer...
Source: http://securityresponse.symantec.com/avcenter/security/Content/2004.06.30a.html

CodeRed II

Technical details
...closesocket, and WSAGetLastError. From User32.dll, it gets ExitWindowsEx, which the worm uses to reboot the system....
Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.ii.html

CodeRed.F

Technical details
...closesocket, and WSAGetLastError. From User32.dll, the worm gets ExitWindowsEx, which it uses to restart the system....
......
Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.f.html



Valid HTML 4.01!