Stolen credit card
http://www.mrt.gov.gh/tramadol/ ">order tramadol online pharmacy
???Upon execution, the worm generates IP [Internet Protocol] addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability,??? the Symantec researchers explained. ???If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target.???