: Disconnect the infected machine from the network immediately.

While specific hashes vary by version, keep an eye out for these common signs of infection:

Frequently distributed via phishing emails containing the .zip archive, often disguised as an invoice, shipping document, or software update. Execution Chain

To steal browser credentials, cookies, keystrokes, and system metadata.

The file is associated with a credential-stealing malware (often classified as a "stealer" or "spyware") designed to exfiltrate sensitive data from infected Windows systems. Based on technical analysis, Malware Summary Type: Information Stealer / Keylogger Target OS: Windows

: It hooks into the Windows API to record every character typed by the user.

: Change all passwords for accounts accessed on that machine, especially banking and email.