No obvious symptoms.
Please let BitDefender disinfect your files.
Lutas Andrei Vlad, virus researcher
The first step involves decrypting the rest of the script, responsible for spraying the shell-code at a specific address, inside the attacked process.
It will then place several NOP (No OPeration) instructions at the begging of the code, in order to avoid receiving execution at an invalid address.
The exploit code (~450 B) will first decrypt its encrypted body, locate several API functions it needs and then it will download a file from http://netcorb[removed]/load.php, saving it under the name "~.exe", in the current folder. After a successful download, it will launch the file. The downloaded executable may be subject to change, and at the time of writing, the link was dead.