It attempts to contact a Remote Command & Control (C2) server.

Peer-to-Peer (P2P) networks, malicious email attachments, or deceptive "download buttons" on media-hosting sites. 3. Behavior & Risk Assessment

1. Executive Summary

Review your "Startup" tab in Task Manager for any unrecognized entries. 5. Conclusion

It may modify the Windows Registry or create "Scheduled Tasks" to ensure it runs every time the computer starts.