Run a full system scan using updated antivirus software (such as Microsoft Defender or Malwarebytes).

Typically distributed via phishing emails or through malicious links on forums and messaging platforms (e.g., Telegram or Discord). Risk Mitigation & Recommendations

RAR Archive (often containing malicious executables or scripts).

Tools that allow attackers to gain full control over the infected machine.