Description
Infostealers often target stored browser data, which can include saved credentials etc.
dd7136c20a28da9087a7bc8604d0e18d3b455b3c697285a5826409e68c9eab90
407KB
220521-tg5vbadcep
7c4c6fc4d6df19db0b3fb4d8273c6cd4
f839b42fc625cbea2f5e47e48d29f1ba1f30a559
dd7136c20a28da9087a7bc8604d0e18d3b455b3c697285a5826409e68c9eab90
44fde129e9ccc1919782950c4935d6ad8a48ce13e2ea1e5970bbafc45cf96c775b8083c0203003464564258a0c826b3a5ea5468560b6021607a498a11bb163b6
dd7136c20a28da9087a7bc8604d0e18d3b455b3c697285a5826409e68c9eab90
7c4c6fc4d6df19db0b3fb4d8273c6cd4
407KB
f839b42fc625cbea2f5e47e48d29f1ba1f30a559
dd7136c20a28da9087a7bc8604d0e18d3b455b3c697285a5826409e68c9eab90
44fde129e9ccc1919782950c4935d6ad8a48ce13e2ea1e5970bbafc45cf96c775b8083c0203003464564258a0c826b3a5ea5468560b6021607a498a11bb163b6
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.