: If you have downloaded this file, do not open it. Delete it immediately.

: Use a reputable antivirus tool to scan your system for any residual files or registry changes.

: It gathers hardware details, IP addresses, and screenshots of the victim's desktop.

: It scans for local cryptocurrency wallet files and browser extensions to exfiltrate private keys.

: High Risk. It is typically flagged as an Infostealer (such as RedLine, Vidar, or Lumma Stealer). Common Behavior :

: Most major antivirus engines (Microsoft Defender, Bitdefender, Kaspersky) flag these files under names like Trojan:Win32/Stealer , Spyware.PasswordStealer , or Generic.Malware/Suspicious . Recommended Actions

: If the file was executed, assume all passwords stored on that machine are compromised. Change your critical passwords (email, banking, crypto) from a different, clean device.