Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Unlike previous variants, this latest version of the malicious program is able to exploit a recent zero-day vulnerability (CVE-2010-2568) in Microsoft Window's handling of shortcut icons.
For more information on the vulnerability, please refer to Microsoft Security Bulletin 2286198 (http://www.microsoft.com/technet/security/advisory/2286198.mspx).
This malware is also mentioned in our Labs Weblog:
Description Created: 2010-07-27 05:42:20.0
Description Last Modified: 2010-07-27 06:50:49.0