Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Unlike previous variants, this latest version of the malicious program is able to exploit a recent zero-day vulnerability (CVE-2010-2568) in Microsoft Window's handling of shortcut icons.
For more information on the vulnerability, please refer to Microsoft Security Bulletin 2286198 (http://www.microsoft.com/technet/security/advisory/2286198.mspx).
This malware is also mentioned in our Labs Weblog:
Description Created: 2010-07-27 05:42:20.0
Description Last Modified: 2010-07-27 06:50:49.0