May disable antivirus software to remain persistent. Analysis Overview Analysis of similar samples shows high-risk behavior:

Often bundled with remote access trojans (RATs).

Can steal your browser saved passwords or crypto wallets.

Attempts to contact unknown command-and-control (C2) servers.