UAD Dytronics Cyclosonic Panner.dll threat report

MD5 a286b0a195746fe57ca09521e79e7eb2
Latest seen 2026-03-30 23:00:41 (a month ago)
First seen 2019-10-12 13:25:59 (6 years ago)
Size 9 MB

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Heur!. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Heur!
Recommended action
Scan and remove
Last analysis
2026-03-30 23:00:41 (a month ago)
File hash
a286b0a195746fe57ca09521e79e7eb2
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Heur!.

Timeline

First seen 2019-10-12 13:25:59 (6 years ago); latest analysis 2026-03-30 23:00:41 (a month ago).

Publisher context

Company metadata: Universal Audio, Inc.. Product metadata: UAD Dytronics Cyclosonic Panner.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

UAD Dytronics Cyclosonic Panner.dll is a Windows file recorded in the ThreatInfo database. It is associated with UAD Dytronics Cyclosonic Panner. The reported company name is Universal Audio, Inc.. The current detection status is Trojan.Heur!, based on the latest analysis from 2026-03-30 23:00:41 (a month ago).

If UAD Dytronics Cyclosonic Panner.dll appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Heur!.

Product Name: UAD Dytronics Cyclosonic Panner
Company Name: Universal Audio, Inc.
MD5: a286b0a195746fe57ca09521e79e7eb2
Size: 9 MB
First Published: 2019-10-12 13:25:59 (6 years ago)
Latest Published: 2026-03-30 23:00:41 (a month ago)
Status: Trojan.Heur! (on last analysis)
Analysis Date: 2026-03-30 23:00:41 (a month ago)
UAD Dytronics Cyclosonic Panner.dll detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%programfiles%\universal audio\powered plugins
%programfiles%\universal audio\powered plugins
%programfiles%\universal audio\powered plugins

ThreatInfo has observed UAD Dytronics Cyclosonic Panner.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

33.3%
33.3%
33.3%

The strongest geographic signal for this file is Germany with 33.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 66.7%
Windows 7 33.3%

The most common operating system signal for UAD Dytronics Cyclosonic Panner.dll is Windows 10 with 66.7% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

UAD Dytronics Cyclosonic Panner.dll is identified as pe for 64 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000180000000
Entry Address: 0x00112128

PE Sections:

Name Size of data MD5
.text 1336832 4cc0e77b7d2c77a5861b2fa6fca46f8b
.rdata 580096 9ae4358904b08b3e8aaad566b67739a7
.data 601600 323c074caf5fb75bcc9544a348b80ba1
.pdata 71168 4a3b7d68a304bc713f4be6dbf6f6ae8d
dummy1 512 d75aa01bf9a30247050d9c747a321fd4
dummy2 512 56c9e33881989922aa121fab6a6ed870
dummy3 512 9ef054c1dc084737775fc72428e0d403
dummy4 512 03e536b9dce279537b6db32b049cae03
dummy5 512 1ca8d7ab0e5c0af8587b4eec1d0cfbae
dummy6 1024 d7fd593a815dc4714a93d8beafd37e1a
.gfids 512 ddd9e4004066fee67aed7fe4322a38e8
.tls 512 1f354d76203061bfdd5a53dae48d5435
.rsrc 7014912 300af81460a7dffaa4babe7a03784502
.reloc 14848 ed04746fe9022fd75ecbe5ea41a23036

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: