It connects to an IRC channel and waits for commands to be issued by an attacker. Thus, the
* send private and system information from the infected system
* download files into the infected computer
* execute files onto the infected computer
* perform a DoS attack (Denial of Service) on an IP
* send the worm to other users
Remove it from startup by antivirus (also check How To Remove section)Startup Optimizer.