write - file - C:\Documents and Settings\LocalService\Local Settings\Temp\black cumshot horse big feet.write - file - C:\Documents and Settings\Default User\Templates\bukkake lesbian.write - file - C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\swedish beastiality sperm public stockings (Anniston,Sylvia).zip.exe.write - file - C:\Documents and Settings\Default User\Local Settings\Temp\italian animal gay big shower.write - file - C:\Documents and Settings\All Users\Templates\danish nude blowjob licking (Karin).rar.exe.write - file - C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\italian handjob gay catfight cock.The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities.
Worms are reproducing malicious programs that run independently and travel across network connections without human action.