Upon execution, the program first hides the console window using Program.FreeConsole(), effectively concealing its presence from the user. It then attempts to access the Windows registry to check for the presence of Microsoft Outlook by locating the OUTLOOK.EXE path. If this search is successful, the malware proceeds to download a malicious ZIP file from a remote URL https://share-center.com/files/Attachment.zip and saves it to the public user directory.
Next, the malware constructs an email with the subject line “The Files You Requested” including the infected ZIP file as an attachment. This action is intended to spread the ZIP file to other users. Additionally, if the system is part of an Active Directory environment, the malware checks for domain membership and attempts to execute a function called InfectAD to propagate throughout the network, highlighting its intent to spread laterally within enterprise environments.