Description
Infostealers often target stored browser data, which can include saved credentials etc.
b0f15a5de3d2ad69a1758d34ef6e1c2e03299712c4b707877241f0a4dc2c4d94
415KB
220521-tzgkfadddr
8f72409a5891b12d5d9492c1f6541def
2331c1aa8d071675f9ab490dd8681267c4dd073a
b0f15a5de3d2ad69a1758d34ef6e1c2e03299712c4b707877241f0a4dc2c4d94
b306f52760f9ccf549381dbacc8362ecad80ede26777ad49fa2dc93e8ad78e3518373344b5fbaf0c0a6404ba3f9b97a6b9f578cc0b803620568a203bdb63bcdb
b0f15a5de3d2ad69a1758d34ef6e1c2e03299712c4b707877241f0a4dc2c4d94
8f72409a5891b12d5d9492c1f6541def
415KB
2331c1aa8d071675f9ab490dd8681267c4dd073a
b0f15a5de3d2ad69a1758d34ef6e1c2e03299712c4b707877241f0a4dc2c4d94
b306f52760f9ccf549381dbacc8362ecad80ede26777ad49fa2dc93e8ad78e3518373344b5fbaf0c0a6404ba3f9b97a6b9f578cc0b803620568a203bdb63bcdb
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.