It attempts to contact a Remote Command & Control (C2) server.
Peer-to-Peer (P2P) networks, malicious email attachments, or deceptive "download buttons" on media-hosting sites. 3. Behavior & Risk Assessment
1. Executive Summary
Review your "Startup" tab in Task Manager for any unrecognized entries. 5. Conclusion
It may modify the Windows Registry or create "Scheduled Tasks" to ensure it runs every time the computer starts.