What's happening?

When extracted and executed, files inside this archive typically perform the following actions:

: Some variants attempt to disable Windows Defender real-time protection or change registry values to ensure they run automatically (persistence).

: Monitors and captures keyboard inputs or scrapes saved passwords from browsers. Recommended Actions If you have downloaded or attempted to open this file:

: Reads computer name, machine GUID, and location settings.

: Likely an InfoStealer (such as RedLine or similar families) that targets browser data and crypto wallets.