Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

6.3.9600.16384 (winblue_rtm.130821-1623) 4.35%
6.3.9600.16384 (winblue_rtm.130821-1623) 0.10%
6.3.9431.0 (winmain_bluemp.130615-1214) 0.24%
6.3.9431.0 (winmain_bluemp.130615-1214) 0.05%
6.2.9200.16384 (win8_rtm.120725-1247) 2.49%
6.2.9200.16384 (win8_rtm.120725-1247) 13.87%
6.2.8400.0 (winmain_win8rc.120518-1423) 0.10%
6.2.8400.0 (winmain_win8rc.120518-1423) 0.10%
6.2.8250.0 (winmain_win8beta.120217-1520) 0.05%
6.2.8102.0 (winmain_win8m3.110823-1455) 0.10%
6.1.7600.16385 (win7_rtm.090713-1255) 25.05%
6.1.7600.16385 (win7_rtm.090713-1255) 44.53%
6.1.7600.16385 (win7_rtm.090713-1255) 0.05%
6.0.6001.18000 (longhorn_rtm.080118-1840) 7.08%
6.0.6001.18000 (longhorn_rtm.080118-1840) 1.46%
6.0.6000.16386 (vista_rtm.061101-2205) 0.39%

Relationships

Parent process
Child process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
CheckTokenMembership, SetServiceStatus, ReportEventW, RegisterEventSourceW, DeregisterEventSource, RegisterServiceCtrlHandlerW, StartServiceCtrlDispatcherW, RevertToSelf, CreateProcessAsUserW, ImpersonateLoggedOnUser
gdi32.dll
CreateSolidBrush
kernel32.dll
CloseHandle, UnmapViewOfFile, DuplicateHandle, GetCurrentProcess, MapViewOfFile, CreateFileMappingW, GetProcessHeap, HeapFree, lstrcmpW, K32GetModuleBaseNameW, K32GetModuleInformation, GetLastError, K32EnumProcessModules, CompareStringW, lstrlenW, CompareFileTime, GetSystemTimeAsFileTime, K32GetModuleFileNameExW, OpenProcess, GetCurrentProcessId, SetLastError, GetTickCount, HeapSetInformation, GetCurrentThreadId, LocalFree, FormatMessageW, GetModuleHandleW, CreateEventW, DelayLoadFailureHook, GetProcAddress, FreeLibrary, InterlockedCompareExchange, LoadLibraryExA, Sleep, HeapAlloc, TerminateProcess, QueryPerformanceCounter, GetModuleHandleA, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedExchange, UnhandledExceptionFilter, LoadLibraryA
msvcrt.dll
DllMain
ntdll.dll
WinSqmIsOptedIn, WinSqmSetDWORD, WinSqmEndSession, WinSqmStartSession, WinSqmSetString, WinSqmAddToAverageDWORD, WinSqmAddToStream, WinSqmIncrementDWORD, RtlAllocateAndInitializeSid, RtlFreeSid, WinSqmEventEnabled, WinSqmEventWrite
psapi.dll
GetModuleBaseNameW, EnumProcessModules, GetModuleFileNameExW, GetModuleInformation
shell32.dll
SHGetFolderPathW
user32.dll
EnumWindows, RegisterShellHookWindow, SetWindowLongW, RegisterWindowMessageW, PostQuitMessage, IsWindow, DestroyWindow, DefWindowProcW, SetTimer, GetLastInputInfo, MoveWindow, GetSystemMetrics, KillTimer, SetShellWindow, SystemParametersInfoW, ShowWindow, GetWindowTextW, RegisterClassW, GetWindow, UnregisterClassW, DispatchMessageW, GetMessageW, GetUserObjectInformationW, GetThreadDesktop, GetProcessWindowStation, LoadStringW, FlashWindowEx, DestroyIcon, LoadIconW, GetWindowRect, FindWindowW, SendMessageW, GetWindowLongW, GetClassLongW, PostMessageW, GetWindowThreadProcessId, GetWindowInfo, GetClassNameW, LoadCursorW, GetWindowTextLengthW, SetTaskmanWindow, CreateWindowExW
version.dll
GetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
winsta.dll
WinStationGetSessionIds, WinStationRevertFromServicesSession, WinStationSwitchToServicesSession
wtsapi32.dll
WTSUnRegisterSessionNotification, WTSRegisterSessionNotification, WTSDisconnectSession, WTSQueryUserToken

ui0detect.exe

Interactive services detection by Microsoft

Remove ui0detect.exe
Version:   6.1.7600.16385 (win7_rtm.090713-1255)
MD5:   8344fd4fce927880aa1aa7681d4927e5
SHA1:   4c0d16bd7c0c13d4d279dcfd3a7bc8b790da35f7
SHA256:   1b54efa60a221e2b9ffe59bb41c7e7d8b5ac6826f1c5577456d81371d464255a
This is a Windows system installed file with Windows File Protection (WFP) enabled.

What is ui0detect.exe?

Services and system processes run in session 0. Interactive Services Detection (the blinking button on the taskbar) is a mitigation for legacy applications that detects if a service is trying to interact with the desktop. This is handled by the Interactive Services Detection (UI0Detect) service.

About ui0detect.exe (from Microsoft)

On a 32-bit version of Windows, the OS will detect desktop interaction and start the UI0Detect service and you will see the flashing taskbar button. On a 64-bit version of Windows, if the service is a

DetailsDetails

File name:ui0detect.exe
Publisher:Microsoft Corporation
Product name:Interactive services detection
Description:Microsoft® Windows® Operating System
Typical file path:C:\Windows\System32\ui0detect.exe
Original name:UI0Detect.exe.mui
File version:6.1.7600.16385 (win7_rtm.090713-1255)
Product version:6.1.7600.16385
Size:35 KB (35,840 bytes)
Digital DNA
PE subsystem:Windows GUI
Entropy:5.944083
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

BehaviorsBehaviors

Services
Runs under 'SYSTEM\CurrentControlSet\Services' by the Service Controller (services.exe)
  • 'UI0Detect'

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.04821502%
0.028634%
Kernel CPU:0.02806040%
0.013761%
User CPU:0.02015462%
0.014873%
Kernel CPU time:62,726 ms/min
100,923,805ms/min
CPU cycles:386,776/sec
17,470,203/sec
Context switches:4/sec
284/sec
Memory
Private memory:1.77 MB
21.59 MB
Private (maximum):4.95 MB
Private (minimum):4.09 MB
Non-paged memory:1.77 MB
21.59 MB
Virtual memory:80.85 MB
140.96 MB
Virtual memory (peak):81.33 MB
169.69 MB
Working set:4.18 MB
18.61 MB
Working set (peak):5.45 MB
37.95 MB
Page faults:2,079/min
2,039/min
I/O
I/O read transfer:6 Bytes/sec
1.02 MB/min
I/O read operations:1/sec
343/min
I/O other transfer:25 Bytes/sec
448.09 KB/min
I/O other operations:11/sec
1,671/min
Resource allocations
Threads:5
12
Handles:92
600
GUI GDI count:75
103
GUI GDI peak:81
142
GUI USER count:34
49
GUI USER peak:39
71

BehaviorsProcess properties

Integrety level:System
Platform:32-bit
Command lines:
  • C:\Windows\System32\ui0detect.exe
  • ui0detect.exe 220
Owner:SYSTEM
Windows Service
Service name:UI0Detect
Display name:Detección de servicios interactivos
Description:“Habilita la notificación al usuario sobre la entrada de usuario para los servicios interactivos; esto habilita el acceso a los cuadros de diálogo creados por los servicios interactivos cuando aparecen. Si se detiene este servicio, dejarán de funcionar las notificaciones de cuadros de diálogo de nuevos servicios interactivos y es posible que no se pueda obtener acceso a los cuadros de diálogo de se”
Type:Win32OwnProcess, InteractiveProcess
Parent processes:

ResourcesThreads

Averages
 
sechost.dll
Total CPU:0.03270406%
0.272967%
Kernel CPU:0.01197987%
0.107585%
User CPU:0.02072418%
0.165382%
CPU cycles:720,417/sec
5,741,424/sec
Context switches:1/sec
79/sec
Memory:100 KB
1.16 MB
UI0Detect.exe (main module)
Total CPU:0.02872216%
Kernel CPU:0.02300406%
User CPU:0.00571809%
CPU cycles:939,031/sec
Context switches:5/sec
Memory:48 KB

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 34.00%
Windows 8.1 17.50%
Windows 7 Ultimate 15.00%
Windows 8.1 Pro 7.50%
Windows 7 Professional 6.00%
Windows 8 4.00%
Windows 8.1 Single Language 3.50%
Windows 8 Pro 3.00%
Windows 8 Single Language 2.50%
Windows 8.1 Pro with Media Center 2.00%
Windows 7 Home Basic 1.50%
Windows 8 Enterprise N 1.00%
Windows 8.1 N 0.50%
Windows Seven Black Edition 0.50%
Windows 8.1 Enterprise Evaluation 0.50%
Windows Vista Home Premium 0.50%
Windows 8 Enterprise 0.50%

Distribution by countryDistribution by country

United States installs about 45.73% of Interactive services detection.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 18.90%
Dell 18.90%
ASUS 18.11%
Acer 12.60%
Toshiba 10.24%
Lenovo 8.66%
Sony 4.72%
Intel 2.36%
GIGABYTE 1.97%
Samsung 1.57%
Alienware 1.18%
Medion 0.79%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE