: The user extracts the archive and runs a file inside (often disguised as a PDF or Document icon).

: If you believe the file was executed, immediately change your passwords and enable Multi-Factor Authentication (MFA) on all sensitive accounts from a separate, clean device.

: Broad targeting, often distributed via phishing emails or malicious downloads masquerading as software updates or utility tools. Typical Contents & Behavior

: Use an updated antivirus solution to scan and remove the file immediately.