This Windows-based worm gave the attacker complete control over the infected computer, including access to all files with ability to upload, download, execute and delete.