This is an Internet worm. It may spread via e-mail attachments or through some networks or vulnerable programs. Once executed, the worm starts its spreading routine and may have a payload. It may infect personal documents, corrupt system files or delete several programs. The worm may be used by attackers to control your system remotely.
• Hides from the user
It might be that we are affiliated with any of our recommended products. Full disclosure can be found in
our Agreement of Use.