Common Information
Type Value
Value
c:\windows\system32\services.exe
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-11-14 39 Blinded by Silence
Details Website 2024-10-06 30 Trojan:Win64/Zusy.CZ!MTB Virus Analysis & Easy Fix Ways –
Details Website 2024-10-01 29 What is Trojan:Win32/LsassDump.A Virus? Remove Now –
Details Website 2024-09-13 143 THM Metasploit Meterpreter
Details Website 2024-09-11 24 Trojan:Win32/Leonem – Gridinsoft Blogs
Details Website 2024-05-24 23 Detection Engineering :: Velociraptor - Digging deeper!
Details Website 2023-12-13 426 Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Introduction
Details Pdf 2023-11-09 1572 Modern Asian APT Groups
Details Website 2023-09-25 206 From ScreenConnect to Hive Ransomware in 61 hours - The DFIR Report
Details Website 2023-05-24 4 How to stop attacks from network? - Virus, Trojan, Spyware, and Malware Removal Help
Details Website 2023-04-05 15 Detecting Named Pipe Token Impersonation Abuse
Details Website 2022-07-20 62 OODA: X-Ops Takes On Burgeoning SQL Server Attacks
Details Website 2022-02-21 89 Qbot and Zerologon Lead To Full Domain Compromise
Details Website 2021-11-08 28 Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 1 - CYB3RSN0RLAX
Details Website 2020-10-16 6 Second Zerologon attacker seen exploiting internet honeypot
Details Website 2017-04-11 22 Chronicles of a Threat Hunter: Hunting for Remotely Executed Code via Services & Lateral Movement with Sysmon, Win Event Logs, and ELK
Details Pdf 2014-03-11 482 Malware Memory Analysis for Non-Specialists: Investigating Publicly Available Memory Image for the Stuxnet Worm
Details Pdf 2013-03-27 163 APT1: technical backstage
Details Website 2012-12-11 14 Extracting ZeroAccess from NTFS Extended Attributes
Details Website 2011-09-15 158 Неиллюзорно поражён
Details Website 2011-05-16 66 Dumping Hashes on Win2k8 R2 x64 with Metasploit :: malicious.link — welcome
Details Website 2009-08-12 25 Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics | Corelan Cybersecurity Research
Details Pdf 216 Microsoft Word - FTA 1009 - njRAT Uncovered_rev2