Snoozegnat.7z

: The user is enticed to extract the archive and run the "launcher."

: Creation of temporary .tmp files in the %AppData% directory that match the size of your system's ntdll.dll . Conclusion & Mitigation

Upon extracting the archive, we find a multi-stage execution chain designed to evade detection by standard Windows Defender signatures. The archive contains: