Description of Trojan:DOS/Alureon.E and consequences of its residing on your PC’s

Trojan:DOS/Alureon.E represents a family of infections focused on stealing confidential info on your computer system. It is installed as a VBR i.e. the infection is introduced into your boot area. That seriously aggravates its extermination. Here you will find a free scanner to get rid of Trojan:DOS/Alureon.E and thus protect the data private only to you.

Technical Details and screenshots:

  • Full name: Trojan:DOS/Alureon.E, Alureon.E,
  • Type: Trojan horse, Virus
  • Risk: EXTREME
  • Trojan:DOS/Alureon.E Manual removal: Possible
  • Trojan:DOS/Alureon.E automated removal: Recommended

Signs of being infected with Trojan:DOS/Alureon.E

The rogue is a rootkit protected malware. That is, its components are hidden from operating system. Moreover, the infection does not allow Windows to learn details of digital signatures for drives on your PC.
A typical symptom available for unaided eye associated with rogue is that operating system fails to boot from time to time.
Click here to remove Trojan:DOS/Alureon.E and other members of this and different strains of malware.

Trojan:DOS/Alureon.E automatical removal:

The tool below is a properly armored solution to protect its own components from the aggressive rootkit. Do not hesitate following the link below to delete Trojan:DOS/Alureon.E.

Trojan:DOS/Alureon.E Removal Tool

Manual Removal of Trojan:DOS/Alureon.E:

The guide will walk you through the steps of the rootkit exterminations. Please perform the cleaning action according to the order they are listed below.

Remove Trojan:DOS/Alureon.E files and dll’s:

%AllUsersProfile%\~
%AllUsersProfile%\~r
%AllUsersProfile%\.dll
%AllUsersProfile%\.exe
%AllUsersProfile%\
%AllUsersProfile%\.exe

Unregister Trojan:DOS/Alureon.E registry values:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallPaper” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = ‘/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:’
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = ‘no’
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘yes’
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “Hidden” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “ShowSuperHidden” = 0′

Trojan:DOS/Alureon.E removal