|
user32.dll ( 5.1.2600.1134)
Enthalten in den Programmen |
Name: | Windows XP Home Edition, Deutsch |
Lizenz: | kommerziell |
Info-Link: | http://www.microsoft.com/windowsxp/ |
Dateidetails |
Dateipfad: | C:\WINDOWS\$NtUninstallKB824141$ \ user32.dll |
Dateidatum: | 2002-11-22 20:28:16 |
Version: | 5.1.2600.1134 |
Dateigröße: | 530.432 Bytes |
Prüfsumme und Datei-Hashwerte |
CRC32: | 967A01EF |
MD5: | DB15 B2FE 24EC CE33 1EA3 A954 F6F9 0448 |
SHA1: | 51AE 4410 6AD4 F751 DCDA 4C0A 690E 3047 0F0E 22A1 |
Versions-Informationen |
Firmenname: | Microsoft Corporation |
Datei-Beschreibung: | Client-DLL für Windows XP USER-API |
Datei-Betriebssystem: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
Datei-Typ: | Dynamic Link Library (DLL) |
Datei-Version: | 5.1.2600.1134 |
Interner Name: | user32 |
Copyright: | © Microsoft Corporation. Alle Rechte vorbehalten. |
Ursprünglicher Dateiname: | user32 |
Produktname: | Betriebssystem Microsoft® Windows® |
Produktversion: | 5.1.2600.1134 |
user32.dll wurde in den folgenden Reports gefunden:
|
JS.Rootlet.A@m |
Technische Details ...Mapi32.dll.js User32.dll.js Wsock32.dll.js... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/js.rootlet.a@m.html |
Ceydem.6750.Worm |
Technische Details ...The worm copies itself to %windir%CeyDem.com, %windir%WinuserUser32.dll, and %windir%Winuser2Sexy_jpg.com.... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/ceydem.6750.worm.html |
W32.Simile |
Technische Details ...the host file (the file that is infected with the virus) imports the Windows file User32.dll, then on the 17th of March, June, September, or December, a message is displayed.... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html |
W95.Sleepyhead.5632 |
Technische Details ...for Kernel32.dll functions. Then it loads User32.dll and WSock32.dll libraries and searches for functions in them.... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w95.sleepyhead.5632.html |
Symantec Vulnerability Assessment 1.0 Vulnerability Updates |
Variable Buffer Overflow Vulnerability 8827 Host Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 8828 Host Microsoft Windows Help And Support... Quelle: http://securityresponse.symantec.com/avcenter/security/Content/2003.11.06.html |
Symantec Vulnerability Assessment 1.0 Vulnerability Updates |
Engine Remote Code Execution Vulnerability 8827 Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability 10113 Microsoft Negotiate SSP Remote Buffer... Quelle: http://securityresponse.symantec.com/avcenter/security/Content/2004.06.30a.html |
CodeRed II |
Technische Details ...closesocket, and WSAGetLastError. From User32.dll, it gets ExitWindowsEx, which the worm uses to reboot the system.... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/codered.ii.html |
CodeRed.F |
Technische Details ...closesocket, and WSAGetLastError. From User32.dll, the worm gets ExitWindowsEx, which it uses to restart the system.... ...... Quelle: http://securityresponse.symantec.com/avcenter/venc/data/codered.f.html |
|
|