: Use a reputable tool like Malwarebytes or Windows Defender Offline scan to remove the infection.

: Upon execution, it attempts to bypass Windows Defender, establishes persistence, and communicates with a Command & Control (C2) server to exfiltrate data. Data Targeted If executed, the malware seeks to steal:

: Screenshots, hardware specifications, and IP address. Recommended Actions If you have interacted with this file:

: Stop the malware from sending your data to the attacker's server.

: Private keys and seed phrases from browser extensions and desktop wallets.

: Most commonly associated with Lumma Stealer , a Malware-as-a-Service (MaaS) that targets sensitive data.

If you haven't opened the file yet, and empty your recycle bin.

: Saved passwords, cookies, autofill data, and credit card details from Chrome, Edge, and Firefox.