The executable typically attempts to connect to a Command and Control (C2) server via HTTP or SMTP to exfiltrate the stolen data.

Use an updated antivirus like Microsoft Defender or Malwarebytes to perform a full system scan.

Often flagged as a Trojan or Spyware (specifically variants like AgentTesla or Formbook ).

If you are analyzing this for research, ensure you are using a dedicated Sandbox Environment with networking disabled. AI responses may include mistakes. Learn more

The malware may attempt to copy itself to the %AppData% or %Temp% folders and create a registry key to ensure it runs every time the system starts.

If you have encountered this file, avoid extracting the contents or running any included executables.