It attempts to connect to a Command and Control (C2) server to send your data.

Look at "Logged in devices" on your accounts and log out of any suspicious sessions.

Run a deep scan using Malwarebytes or another trusted antivirus.