This Trojan may be downloaded from remote sites by other malware.It may be dropped by other malware.It may be downloaded unknowingly by a user when visiting malicious Web sites.
It registers itself as a system service to ensure its automatic execution at every system startup. It does this by creating registry keys/entries.
It drops files.It then executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
More...