If you did run it, disconnect your PC from the internet to stop data exfiltration.
Installs itself in the system's startup folders to remain active after a reboot [5, 7]. 🛠️ Immediate Steps if Downloaded
Once the .zip is extracted and run, it often uses sideloading or obfuscated scripts to bypass traditional antivirus detection [5, 7]. ⚠️ Key Risks
Can record audio, take screenshots, and log keystrokes [1, 2].