️ RDP Stealer - New powerful Stealer sending Rezlt to Telegram ️
DESCRIPTION :
I know most people work on RDP , When you connect to a computer
(either a Windows client or Windows Server) through the Remote Desktop client
the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default)
Port 3389 is being checked in RDP The malware is then run on the RDP
The password is changed without the need for the old password
How To Use
Extract The Zip File / Change token and ID / send to target
The software collects a digital fingerprint of the computer :
- Version of the operating system and its bitness
- IP and RAM
- Computer name
- Local time
- I am not responsible for how you use the software
DESCRIPTION :
I know most people work on RDP , When you connect to a computer
(either a Windows client or Windows Server) through the Remote Desktop client
the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default)
Port 3389 is being checked in RDP The malware is then run on the RDP
The password is changed without the need for the old password
How To Use
Extract The Zip File / Change token and ID / send to target
The software collects a digital fingerprint of the computer :
- Version of the operating system and its bitness
- IP and RAM
- Computer name
- Local time
- I am not responsible for how you use the software
RDP Stealer.zip - Shared with pCloud
Keep, share and access your files whenever you need from wherever you are. Create a free pCloud account and make your life easier.
u.pcloud.link