The malware payload varies from time to time, depending on the attacker’s goal. Usually, the GOTO application of this type of infection is Bots. Once the system is infected, hackers can take control of the compromised computers to use them for the illegal purposes, - e.g. advertisement (ads click fraud), user data encryption (
ransomware) to later demand a ransom, etc…