Allowing remote access to the victim's computer;
Spreading other malware;
Logging keystrokes to steal information such as passwords and credit card numbers
Phishing for bank or other account details, which can be used for criminal activities
Installing a backdoor on a computer system
Opening and closing CD-ROM tray
Playing sounds, videos or displaying images.
Calling using the modem to expensive numbers, thus causing massive phone bills.
Harvesting e-mail addresses and using them for spam
Restarting the computer whenever the infected program is started
Deactivating or interfering with anti-virus and firewall programs
Deactivating or interfering with other competing forms of malware
Randomly shutting off the computer