It downloads additional malware, such as info-stealers (to grab passwords/banking data), ransomware, or miners (to use your PC's resources).

It may modify the Windows Registry or create "Scheduled Tasks" to ensure it runs every time the computer starts.

Peer-to-Peer (P2P) networks, malicious email attachments, or deceptive "download buttons" on media-hosting sites. 3. Behavior & Risk Assessment

If it is on your system, do not double-click or execute it.