티스토리 뷰
O20 - AppInit_DLLs: APSHook.dll
APSHook.dll file information
The process Application Protection Hook belongs to the software Cognizance Identity Manager or ASUS Security Protect Manager or APSHook.dll or Bioscrypt VeriSoft Single Sign On by Cognizance Corporation or Bioscrypt Inc.
Description: File APSHook.dll is located in the folder C:\Windows\System32. Known file sizes on Windows XP are 56832 bytes (89% of all occurrence), 70144 bytes, 52736 bytes.
A .dll file (Dynamic Link Library) is a special type of Windows program containing functions that other programs can call. This .dll file can be injected to all running processes and can change or manipulate their behavior. The program has no visible window. There is no detailed description of this service. It can change the behavior of other programs or manipulate other programs. It is not a Windows core file. The application starts when Windows starts (see Registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs). APSHook.dll is able to record inputs, monitor applications. Therefore the technical security rating is 76% dangerous.
http://www.castlecops.com/o20list-438.html
O20 AppInit_DLLs and Winlogon Notify
Field | Value |
O20 Type | AppInit_DLLs |
Name | |
Path/File | APSHook.dll |
Status | L |
Description | Cognizance_Identity_Manager |
STATUS KEY: "L" - Legitimate "O" - Open to Debate "X" - Malware/Bad "?" - Unknown Navigate: [O20 AppInit_DLLs and Winlogon Notify] - Feeds to come shortly... |
'보안 > 악성코드' 카테고리의 다른 글
%PFDIR% Windows Media Player WMPNSCFG.exe (0) | 2008.10.21 |
---|---|
%WINDIR% System32 DreamScene.dll (0) | 2008.10.21 |
%PFDIR% clientkeeper phishingpro bin ckphishingpro.exe (0) | 2008.10.21 |
%WINDIR% system32 wisptis.exe (0) | 2008.10.21 |
%WINDIR% system32 wininit.exe (0) | 2008.10.21 |
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- 군함도
- 신한저축은행
- 맥쿼리인프라
- ElasticSearch
- 레고랜드
- 실시간트래이딩
- 주택구매력지수
- systemd
- 매매가격지수
- 주식트래이딩
- ubuntu
- 미국주식
- CriticalSection
- Pivot
- 사회간접자본
- 주식
- hai
- INVOICE
- 피봇
- logrotate
- 공공인프라
- ChatGPT
- SBI저축은행
- 자동트래이딩
- O365
- 시스템트래이딩
- PIR
- 전세매매지수
- 다올저축은행
- ROA
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |