Takes advantage of the resources available on an infected system to do some or all of the following: to propagate itself via floppy drives,
email or network connections; to destroy data; and possibly to embarass the owner of the system by distributing documents found on the
victim system's hard drive.