This section describes how the threat behaves when executed.
It includes the following information:
Use this information together with the removal instructions in
the Recommendation tab to restore affected
systems. This section is either automatically generated or manually
prepared by threat researchers.