... | File: Hyper.jam.zip

: Upon extraction and execution of the contents, it may attempt to add itself to the Windows Registry "Run" keys to start with your PC.

: Many versions of this file are flagged by antivirus engines as Trojan.Generic or Riskware . Behavioral Notes : File: Hyper.Jam.zip ...

: Similar files have been linked to RedLine Stealer or Lumina Stealer , which aim to grab browser passwords, cookies, and crypto wallet data. : Upon extraction and execution of the contents,

: Perform a "Threat Scan" to look for any registry changes or background processes. : Perform a "Threat Scan" to look for

Based on typical behavior for files with this naming convention found in public sandboxes:

: Often attempts to connect to remote IP addresses (Command & Control servers) to receive further instructions. Security Recommendations

: If you ran the file, assume your browser data is compromised. Change passwords for sensitive accounts (Email, Banking, Discord) from a different, clean device .