[filename.info logo]
[cn user32.dll][de user32.dll][es user32.dll][fr user32.dll][gb user32.dll][it user32.dll][jp user32.dll][kr user32.dll][nl user32.dll][pt user32.dll][ru user32.dll][us user32.dll]

user32.dll (5.1.2600.1255)

Contenu dans le logiciel

Nom:Windows XP Home Edition, Deutsch
Lien de l'information:http://www.microsoft.com/windowsxp/

DĂ©tails de dossier

Chemin de dossier:C:\WINDOWS\system32 \ user32.dll
Date de dossier:2003-09-25 18:52:01
Volume de fichier:561.664 bytes

La somme et le dossier hache

MD5:8D92 8268 AFBF 31F8 A34C E610 DA17 5352
SHA1:810B ACB5 B6A0 037E 24DC 0F23 9AA6 5DC2 7F63 54CD

L'information de ressource de version

Nom de compagnie:Microsoft Corporation
Description de dossier:Client-DLL für Windows XP USER-API
Logiciel d'exploitation de dossier:Windows NT, Windows 2000, Windows XP, Windows 2003
Type de dossier:Dynamic Link Library (DLL)
Version de dossier:5.1.2600.1255
Nom interne:user32
Copyright lĂ©gal:© Microsoft Corporation. Alle Rechte vorbehalten.
Nom de fichier original:user32
Nom de produit:Betriebssystem Microsoft® Windows®
Version de produit:5.1.2600.1255

user32.dll a été trouvé dans les rapports suivants:


DĂ©tails techniques
...Mapi32.dll.js User32.dll.js Wsock32.dll.js...
Source: http://securityresponse.symantec.com/avcenter/venc/data/js.rootlet.a@m.html


DĂ©tails techniques
...The worm copies itself to %windir%CeyDem.com, %windir%WinuserUser32.dll, and %windir%Winuser2Sexy_jpg.com....
Source: http://securityresponse.symantec.com/avcenter/venc/data/ceydem.6750.worm.html


DĂ©tails techniques
...the host file (the file that is infected with the virus) imports the Windows file User32.dll, then on the 17th of March, June, September, or December, a message is displayed....
Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html


DĂ©tails techniques
...for Kernel32.dll functions. Then it loads User32.dll and WSock32.dll libraries and searches for functions in them....
Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.sleepyhead.5632.html

Symantec Vulnerability Assessment 1.0 Vulnerability Updates

Variable Buffer Overflow Vulnerability 8827 Host Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 8828 Host Microsoft Windows Help And Support...
Source: http://securityresponse.symantec.com/avcenter/security/Content/2003.11.06.html

Symantec Vulnerability Assessment 1.0 Vulnerability Updates

Engine Remote Code Execution Vulnerability 8827 Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 10113 Microsoft Negotiate SSP Remote Buffer...
Source: http://securityresponse.symantec.com/avcenter/security/Content/2004.06.30a.html

CodeRed II

DĂ©tails techniques
...closesocket, and WSAGetLastError. From User32.dll, it gets ExitWindowsEx, which the worm uses to reboot the system....
Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.ii.html


DĂ©tails techniques
...closesocket, and WSAGetLastError. From User32.dll, the worm gets ExitWindowsEx, which it uses to restart the system....
Source: http://securityresponse.symantec.com/avcenter/venc/data/codered.f.html

Valid HTML 4.01!