Details

_id 62ee11b4348d24c6a7972e19
reference ['https://twitter.com/h2jazi/status/1555611666343133185/photo/1']
md5 ['5556dd9fefcc1cace18031e89d80554e']
sha1 []
sha256 []
mail []
ip []
domain []
url []
user h2jazi
tweet Could be interesting :) 5556dd9fefcc1cace18031e89d80554e 2022년도_기초과학연구역량강화사업_착수보고회_개최_계획 Ver1.1.chm (2022_Basic Science Research Capacity Reinforcement Project_Initiation Report_Holding_Plan Ver1.1.chm) DLL side loading is used to load the malicious dll: https://twitter.com/h2jazi/status/1555611666343133185/photo/1
id 1555611666343133185
retweets 8
link https://twitter.com/h2jazi/status/1555611666343133185
mentions []
hashtags []
date 2022-08-05 17:48:17
timestamp 1659746897

Tweet