This is an Internet worm. It may spread via e-mail attachments or through some networks or vulnerable programs. Once executed, the worm starts its spreading routine and may have a payload. It may infect personal documents, corrupt system files or delete several programs. The worm may be used by attackers to control your system remotely.