Description
Infostealers often target stored browser data, which can include saved credentials etc.
e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c
407KB
220521-t8sn3aaca5
ccfaf8678bfe1ecd0a4dc16d225195f4
90f58e42214bafea1e0825d181b915ec3c7304c3
e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c
991277fffa77b3488e06255e5c0b9572cbd18b3f7320cc2efc96d43736883cc9c84ce403dc204316dc93be3088ed9d7f057b798835f364313a5f55b3e113f9e1
e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c
ccfaf8678bfe1ecd0a4dc16d225195f4
407KB
90f58e42214bafea1e0825d181b915ec3c7304c3
e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c
991277fffa77b3488e06255e5c0b9572cbd18b3f7320cc2efc96d43736883cc9c84ce403dc204316dc93be3088ed9d7f057b798835f364313a5f55b3e113f9e1
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.