Linda;
MalwareBytes Anti-Malware (MBAM) will remove this old threat. It has a history going back to at least 2004, making it one of the second generation backdoors. Whoever is in control of that malware is using it as a remote control point of access to your PC.
You should be prepared to reboot into safe mode, in case the malware has been case-hardened against standard removal tactics. This is done by restarting and tapping the F8 key constantly, until a boot menu appears. I would recommend Safe Mode with Networking. This will enable you to access the Internet to fetch program or definition updates for MBAM, or other security tools you may have.
Since I don't know how this malware entered your PC, my advice, after removing it for free, would be to pay (about $25) to
register MBAM for life, which turns on automatic updates and a real-time process monitor, to prevent reinfection by known malware.
Further, you need to run an audit of the third party software that runs in your browsers, to find out if anything on your PC is out-dated, being exploited in the wild, and has updates available. If you have insecure versions of commonly exploited software installed and you operate your PC with Administrator privileges, you will be at risk of hostile takeovers by all manner of malware.
The most frequently exploited browser is Internet Explorer. The most exploited browser plug-in (or add-on) is Adobe Flash, followed by Adobe Reader and Acrobat, then Apple Quicktime, then Sun Java. Missing Windows Updates will leave your PC vulnerable to current threats in the wild. You can find out what, if any vulnerable software you have installed, by running the
Secunia Online Software Inspector every other week. The results will tell you what needs to be updated, or uninstalled and provides links to get official updates for the covered applications.
You may wish to consider installing the latest version of
Firefox and making it your default browser. It will import cookies and saved links from IE. Firefox does not recognize ActiveX, the frequently exploited proprietary technology from Microsoft, used in Internet Explorer browsers from the early days.