Link
Make sure your AV is up-to-date (although I can't see anything matching this description on symantec's site).
Consider using a different browser which is not affected by this exploit.
The second half of the file consists of a Win32 DLL that is installed by the file dropper under WindowsXP as a randomly named .dll file under C:\WINDOWS\System32\. This DLL is installed as a "Browser Helper Object" (BHO) under Internet Explorer.
A "Browser Helper Object" is a DLL that allows developers to customize and control Internet Explorer. When IE 4.x and higher starts, it reads the registry to locate installed BHO's and then loads them into the memory space for IE. Created BHO's then have access to all the events and properties of that browsing session. This particular BHO watches for HTTPS (secure) access to URLs of several dozen banking and financial sites in multiple countries.
Make sure your AV is up-to-date (although I can't see anything matching this description on symantec's site).
Consider using a different browser which is not affected by this exploit.