paskaičiau, nes naudoju visur, tai tik kirminas įlenda ar dar kas?
The source article says it contains a domain-generation and command & control mechanisms. So basically it builds a list of and connects to randomly named domains for the owner (=not you) to exfiltrate data and direct the malware to do pretty much whatever they want.
Basically it makes your computer into a zombie on a botnet. Typically these are used to mine cryptocurrency and run distributed denial of service attacks. While they do own your system and can steal private data, databrokers have been hacked so many times by now that identity theft isn’t the most profitable use of a zombied system. Unlike ransomware they don’t want the user to know they’re compromised, so your only indication may be high unexplained CPU or network utilization.