The Poweliks trojan installs its malicious code in a registry key in the Windows registry. Depending on the variant, the trojan may download additional malware onto the affected machine, perform clickfraud or carry out additional instructions from a remote attacker.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
CAUTION Manual removal is a risky process; it is recommended only for advanced users. Otherwise, please seek professional technical assistance.