Figure 9-2: Malware Payloads After propagation viruses and worms execute their payloads(damage code Payloads erase hard disks, send users to pornography sites if they mistype URLS Trojan horses are exploitation programs that disguise themselves as system files7 Figure 9-2: Malware • Payloads – After propagation, viruses and worms execute their payloads (damage code) – Payloads erase hard disks, send users to pornography sites if they mistype URLs – Trojan horses are exploitation programs that disguise themselves as system files